Betrayal in Berlin: The True Story of the Cold War's Most Audacious Espionage Operation


Steve Vogel - 2019
    The tunnel, crossing the border between the American and Soviet sectors, would have to be 1,500 feet (the length of the Empire State Building) with state-of-the-art equipment, built and operated literally under the feet of their Cold War adversaries. Success would provide the CIA and the British Secret Intelligence Service access to a vast treasure of intelligence. Exposure might spark a dangerous confrontation with the Soviets. Yet as the Allies were burrowing into the German soil, a traitor, code-named Agent Diamond by his Soviet handlers, was burrowing into the operation itself. . .Betrayal in Berlin is Steve Vogel’s heart pounding account of the operation. He vividly recreates post-war Berlin, a scarred, shadowy snake pit with thousands of spies and innumerable cover stories. It is also the most vivid account of George Blake, perhaps the most damaging mole of the Cold War. Drawing upon years of archival research, secret documents, and rare interviews with Blake himself, Vogel has crafted a true-life spy story as thrilling as the novels of John le Carré and Len Deighton.Betrayal in Berlin includes 24 photos and two maps.

Ambush at Ruby Ridge : How Government Agents Set Randy Weaver Up and Took His Family Down


Alan W. Bock - 1995
    Bock

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

My Silent War: The Autobiography of a Spy


Kim Philby - 1968
    “Kim” Philby, the ringleader of the legendary Cambridge spies. A member of the British establishment, Philby joined the Secret Intelligence Service in 1940, rose to the head of Soviet counterintelligence, and, as MI6’s liaison with the CIA and the FBI, betrayed every secret of Allied operations to the Russians, fatally compromising covert actions to roll back the Iron Curtain in the early years of the Cold War.Written from Moscow in 1967, My Silent War shook the world and introduced a new archetype in fiction: the unrepentant spy. It inspired John le Carré’s Smiley novels and the later espionage novels of Graham Greene. Kim Philby was history’s most successful spy. He was also an exceptional writer who gave us the great iconic story of the Cold War and revolutionized, in the process, the art of espionage writing.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Germs: Biological Weapons and America's Secret War


Judith Miller - 2001
    In Germs, three veteran reporters draw on top sources inside and outside the U.S. government to lay bare Washington's secret strategies for combating this deadly threat.Featuring an inside look at how germ warfare has been waged throughout history and what form its future might take (and in whose hands), Germs reads like a gripping detective story told by fascinating key figures: American and Soviet medical specialists who once made germ weapons but now fight their spread, FBI agents who track Islamic radicals, the Iraqis who built Saddam Hussein's secret arsenal, spies who travel the world collecting lethal microbes, and scientists who see ominous developments on the horizon. With clear scientific explanations and harrowing insights, Germs is a masterfully written—and timely—work of investigative journalism.

The Ratline: Love, Lies, and Justice on the Trail of a Nazi Fugitive


Philippe Sands - 2020
    By the time the war ended in May 1945, he was indicted for 'mass murder'. Hunted by the Soviets, the Americans, the Poles and the British, as well as groups of Jews, Wächter went on the run. He spent three years hiding in the Austrian Alps, assisted by his wife Charlotte, before making his way to Rome where he was helped by a Vatican bishop. He remained there for three months. While preparing to travel to Argentina on the 'ratline' he died unexpectedly, in July 1949, a few days after spending a weekend with an 'old comrade'.In The Ratline Philippe Sands offers a unique account of the daily life of a senior Nazi and fugitive, and of his wife. Drawing on a remarkable archive of family letters and diaries, he unveils a fascinating insight into life before and during the war, on the run, in Rome, and into the Cold War. Eventually the door is unlocked to a mystery that haunts Wächter's youngest son, who continues to believe his father was a good man - what happened to Otto Wächter, and how did he die?

GCHQ


Richard J. Aldrich - 2010
    Richard Aldrich traces GCHQ's evolvement from a wartime code-breaking operation to one of the world's leading espionage organisations.

Pearl Harbor: Final Judgement: The Shocking True Story of the Military Intelligence Failure at Pearl Harbor and the Fourteen Men Responsible for the Disaster


Henry C. Clausen - 1992
    the authoritative appraisal of why American armed forces met the Japanese attack asleep” (The Christian Science Monitor). On December 6, 1941, Admiral Husband E. Kimmel, commander in chief of the United States Pacific Fleet, assured his staff that the Japanese would not attack Pearl Harbor. The next morning, Japanese carriers steamed toward Hawaii to launch one of the most devastating surprise attacks in the history of war, proving the admiral disastrously wrong. Immediately, an investigation began into how the American military could have been caught so unaware.   The results of the initial investigation failed to implicate who was responsible for this intelligence debacle. Secretary of War Henry L. Stimson, realizing that high-ranking members of the military had provided false testimony, decided to reopen the investigation by bringing in an unknown major by the name of Henry C. Clausen. Over the course of ten months, from November 1944 to September 1945, Clausen led an exhaustive investigation. He logged more than fifty-five thousand miles and interviewed over one hundred military and civilian personnel, ultimately producing an eight-hundred-page report that brought new evidence to light. Clausen left no stone unturned in his dogged effort to determine who was truly responsible for the disaster at Pearl Harbor.  Pearl Harbor: Final Judgement reveals all of the eye-opening details of Clausen’s investigation and is a damning account of massive intelligence failure. To this day, the story surrounding the Japanese attack on Pearl Harbor stokes controversy and conspiracy theories. This book provides conclusive evidence that shows how the US military missed so many signals and how it could have avoided the events of that fateful day.

Killing the SS: The Hunt for the Worst War Criminals in History


Bill O'Reilly - 2018
    A few were swiftly caught, including the notorious SS leader, Heinrich Himmler. Others, however, evaded capture through a sophisticated Nazi organization designed to hide them. Among those war criminals were Josef Mengele, the "Angel of Death" who performed hideous medical experiments at Auschwitz; Martin Bormann, Hitler's brutal personal secretary; Klaus Barbie, the cruel "Butcher of Lyon"; and perhaps the most awful Nazi of all: Adolf Eichmann.Killing the SS is the epic saga of the espionage and daring waged by self-styled "Nazi hunters." This determined and disparate group included a French husband and wife team, an American lawyer who served in the army on D-Day, a German prosecutor who had signed an oath to the Nazi Party, Israeli Mossad agents, and a death camp survivor. Over decades, these men and women scoured the world, tracking down the SS fugitives and bringing them to justice, which often meant death.Written in the fast-paced style of the Killing series, Killing the SS will educate and stun the reader.The final chapter is truly shocking.

The Informant


Kurt Eichenwald - 2000
    A page-turning true story of international scandal and corruption at the very highest levels of corporate America, this thriller unveils botched crimes, courtroom drama, suicide attempts, and an immense tangle of lies and deception.

The Burglary: The Discovery of J. Edgar Hoover's Secret FBI


Betty Medsger - 2014
    Edgar Hoover had created and was operating, in violation of the U.S. Constitution, his own shadow Bureau of Investigation. It begins in 1971 in an America being split apart by the Vietnam War . . . A small group of activists—eight men and women—the Citizens Commission to Investigate the FBI, inspired by Daniel Berrigan’s rebellious Catholic peace movement, set out to use a more active, but nonviolent, method of civil disobedience to provide hard evidence once and for all that the government was operating outside the laws of the land.             The would-be burglars—nonpro’s—were ordinary people leading lives of purpose: a professor of religion and former freedom rider; a day-care director; a physicist; a cab driver; an antiwar activist, a lock picker; a graduate student haunted by members of her family lost to the Holocaust and the passivity of German civilians under Nazi rule.Betty Medsger's extraordinary book re-creates in resonant detail how this group of unknowing thieves, in their meticulous planning of the burglary, scouted out the low-security FBI building in a small town just west of Philadelphia, taking into consideration every possible factor, and how they planned the break-in for the night of the long-anticipated boxing match between Joe Frazier (war supporter and friend to President Nixon) and Muhammad Ali (convicted for refusing to serve in the military), knowing that all would be fixated on their televisions and radios.Medsger writes that the burglars removed all of the FBI files and, with the utmost deliberation, released them to various journalists and members of Congress, soon upending the public’s perception of the inviolate head of the Bureau and paving the way for the first overhaul of the FBI since Hoover became its director in 1924.  And we see how the release of the FBI files to the press set the stage for the sensational release three months later, by Daniel Ellsberg, of the top-secret, seven-thousand-page Pentagon study on U.S. decision-making regarding the Vietnam War, which became known as the Pentagon Papers.             At the heart of the heist—and the book—the contents of the FBI files revealing J. Edgar Hoover’s “secret counterintelligence program” COINTELPRO, set up in 1956 to investigate and disrupt dissident political groups in the United States in order “to enhance the paranoia endemic in these circles,” to make clear to all Americans that an FBI agent was “behind every mailbox,” a plan that would discredit, destabilize, and demoralize groups, many of them legal civil rights organizations and antiwar groups that Hoover found offensive—as well as black power groups, student activists, antidraft protestors, conscientious objectors. The author, the first reporter to receive the FBI files, began to cover this story during the three years she worked for The Washington Post and continued her investigation long after she'd left the paper, figuring out who the burglars were, and convincing them, after decades of silence, to come forward and tell their extraordinary story.  The Burglary is an important and riveting book, a portrait of the potential power of non­violent resistance and the destructive power of excessive government secrecy and spying.

The Secret History of MI6


Keith Jeffery - 2010
    Britain's Secret Intelligence Service (MI6) was born a century ago amid fears of the rising power of other countries, especially Germany. The next 40 years saw MI6 taking an increasingly important & largely hidden role in shaping history. This revelatory account draws on a wealth of archival materials never before seen by outsiders to unveil the inner workings of the world's 1st spy agency. MI6's early days were haphazard but it was quickly forged into an effective organization during WWI. During the war years, MI6 also formed ties with the USA--harbingers of a relationship that would become vital to both. These early years also saw the development of techniques that would become plot devices in books & films--forgery, invisible ink, disguises, concealing mechanisms etc. The interwar years were nominally peaceful, but Britain perceived numerous threats, all of which MI6 was expected to keep tabs on. The outbreak of WWII again caught MI6 off balance, & high-profile blunders (& the memoirs of MI6 operatives like Graham Greene) created an impression of ineffectiveness. At the same time the service was pioneering cryptography at Bletchley Park, breaking the Enigma code & devising the methods & equipment inspiring Ian Fleming's novels. The aftermath of WWII was as dramatic as the war itself had been, because 1945-49 saw not only the end of the British Empire but also the emergence of a new sort of conflict--the Cold War. We witness MI6 wrestling with these epic changes as it tightens its bonds with the newly christened CIA, changes that would dictate the shape of the service & the world for decades.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Dead By Sunset: Perfect Husband, Perfect Killer?


Ann Rule - 1995
    Her Crime Files volumes, based on fascinating case histories, have assured her reputation as our premier chronicler of crime. Now the former Seattle policewoman brings us the horrific account of a charismatic man adored by beautiful and brilliant women who always gave him what he wanted...sex, money, their very lives.... When attorney Cheryl Keeton's brutally bludgeoned body was found in her van in the fast lane of an Oregon freeway, her husband, Brad Cunningham, was the likely suspect. But there was no solid evidence linking him to the crime. He married again, for the fifth time, and his stunning new wife, a physician named Sara, adopted his three sons. They all settled down to family life on a luxurious estate. But gradually, their marriage became a nightmare.... In this gripping account of Cheryl's murder, Ann Rule takes us from Brad's troubled boyhood to one of the most bizarre trials in legal history, uncovering multiple marriages, financial manipulations, infidelities, and monstrous acts of harassment and revenge along the way. Dead By Sunset is Ann Rule at her riveting best.