Legacy of Ashes: The History of the CIA


Tim Weiner - 2007
    Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

The Absent Superpower: The Shale Revolution and a World Without America


Peter Zeihan - 2017
    Terrorism spills out of the Middle East into Europe. Russia, Iran, Saudi Arabia, China and Japan vie to see who can be most aggressive. Financial breakdown in Asia and Europe guts growth, challenging hard-won political stability.Yet for the Americans, these changes are fantastic. Alone among the world's powers, only the United States is geographically wealthy, demographically robust, and energy secure. That last piece -- American energy security -- is rapidly emerging as the most critical piece of the global picture.The American shale revolution does more than sever the largest of the remaining ties that bind America's fate to the wider world. It re-industrializes the United States, accelerates the global order's breakdown, and triggers a series of wide ranging military conflicts that will shape the next two decades. The common theme? Just as the global economy tips into chaos, just as global energy becomes dangerous, just as the world really needs the Americans to be engaged, the United States will be...absent.In 2014's The Accidental Superpower, geopolitical strategist Peter Zeihan made the case that geographic, demographic and energy trends were unravelling the global system. Zeihan takes the story a step further in The Absent Superpower, mapping out the threats and opportunities as the world descends into Disorder.

The Scientist and the Spy: A True Story of China, the FBI, and Industrial Espionage


Mara Hvistendahl - 2020
    government for trying to steal trade secrets, by a finalist for the Pulitzer Prize in nonfiction.In September 2011, sheriff's deputies in Iowa encountered three ethnic Chinese men near a field where a farmer was growing corn seed under contract with Monsanto. What began as a simple trespassing inquiry mushroomed into a two-year FBI operation in which investigators bugged the men's rental cars, used a warrant intended for foreign terrorists and spies, and flew surveillance planes over corn country--all in the name of protecting trade secrets of corporate giants Monsanto and DuPont Pioneer. In The Scientist and the Spy, Hvistendahl gives a gripping account of this unusually far-reaching investigation, which pitted a veteran FBI special agent against Florida resident Robert Mo, who after his academic career foundered took a questionable job with the Chinese agricultural company DBN--and became a pawn in a global rivalry.Industrial espionage by Chinese companies lies beneath the United States' recent trade war with China, and it is one of the top counterintelligence targets of the FBI. But a decade of efforts to stem the problem have been largely ineffective. Through previously unreleased FBI files and her reporting from across the United States and China, Hvistendahl describes a long history of shoddy counterintelligence on China, much of it tinged with racism, and questions the role that corporate influence plays in trade secrets theft cases brought by the U.S. government. The Scientist and the Spy is both an important exploration of the issues at stake and a compelling, involving read.

Zero Trust Networks: Building Secure Systems in Untrusted Networks


Evan Gilman - 2017
    Hosts behind the firewall have no defenses of their own, so when a host in the trusted zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.Understand how the zero trust model embeds security within the system's operation, rather than layering it on topExamine the fundamental concepts at play in a zero trust network, including network agents and trust enginesUse existing technology to establish trust among the actors in a networkLearn how to migrate from a perimeter-based network to a zero trust network in productionExplore case studies of zero trust on the client side (Google) and on the server (PagerDuty)

Stealing the Network: How to Own a Continent


Ryan Russell - 2004
    While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world

Heads in the Sand: How the Republicans Screw Up Foreign Policy and Foreign Policy Screws Up the Democrats


Matthew Yglesias - 2008
    He knows a lot about politics, a lot about foreign policy, and, crucially, is unusually shrewd in understanding how they interact. Here's hoping that his new book will introduce him to an even wider audience. Once you discover him, you'll be hooked.""--E. J. Dionne, author of Souled Out: Reclaiming Faith and Politics After the Religious Right and Why Americans Hate Politics""Matthew Yglesias is one of a handful of bloggers that I make a point of reading every day. Heads in the Sand is a smart, vital book that urges Democrats to stop evading the foreign-policy debate and to embrace the old principles of international liberalism--to be right and also to win.""--Fred Kaplan, author of Daydream Believers: How a Few Grand Ideas Wrecked American Power""Reading foreign policy tomes is seldom included among life's pleasures, but Yglesias has concocted a startling exception. Heads in the Sand is not just a razor-sharp analysis cum narrative of the politics of national security in general and the Iraq war in particular, it's also an enthralling and often very funny piece of writing. Though he administers strong antidotes to the haplessness of his fellow Democrats and liberals, there's more than a spoonful of sugar to help the medicine go down.""--Hendrik Hertzberg, Senior Editor, The New Yorker, and author of Politics: Observations and ArgumentsFast-rising political commentator Matthew Yglesias reveals the wrong-headed foreign policy stance of conservatives, neocons, and the Republican Party for what it is--aggressive nationalism. Writing with wit, passion, and keen insight, Yglesias reminds us of the rich tradition of liberal internationalism that, developed by Democrats, was used with great success by both Democratic and Republican administrations for more than fifty years. He provides a starting point for politicians, policymakers, pundits, and citizens alike to return America to its role as leader of a peace-loving and cooperative international community.

Shadow Strike: Inside Israel's Secret Mission to Eliminate Syrian Nuclear Power


Yaakov Katz - 2019
    Israel often flew into Syria as a warning to President Bashar al-Assad. But this time, there was no warning and no explanation. This was a covert operation, with one goal: to destroy a nuclear reactor being built by North Korea under a tight veil of secrecy in the Syrian desert.Shadow Strike tells, for the first time, the story of the espionage, political courage, military might and psychological warfare behind Israel’s daring operation to stop one of the greatest known acts of nuclear proliferation. It also brings Israel’s powerful military and diplomatic alliance with the United States to life, revealing the debates President Bush had with Vice President Cheney and Israeli Prime Minister Ehud Olmert as well as the diplomatic and military planning that took place in the Oval Office, the Prime Minister’s Office in Jerusalem, and inside the IDF’s underground war room beneath Tel Aviv.These two countries remain united in a battle to prevent nuclear proliferation, to defeat Islamic terror, and to curtail Iran’s attempts to spread its hegemony throughout the Middle East. Shadow Strike explores how this operation continues to impact the world we live in today and if what happened in 2007 is a sign of what Israel will need to do one day to stop Iran's nuclear program. It also asks: had Israel not carried out this mission, what would the Middle East look like today?

The Iran Wars: Spy Games, Bank Battles, and the Secret Deals That Reshaped the Middle East


Jay Solomon - 2014
    Through a combination of economic sanctions, global diplomacy, and intelligence work, successive U.S. administrations have struggled to contain Iran's aspirations to become a nuclear power and dominate the region--what many view as the most serious threat to peace in the Middle East. Meanwhile, Iran has used regional instability to its advantage to undermine America's interests. The Iran Wars is an absorbing account of a battle waged on many levels--military, financial, and covert.Jay Solomon's book is the product of extensive in-depth reporting and interviews with all the key players in the conflict--from high-ranking Iranian officials to Secretary of State John Kerry and his negotiating team. With a reporter's masterly investigative eye and the narrative dexterity of a great historian, Solomon shows how Iran's nuclear development went unnoticed for years by the international community only to become its top security concern. He catalogs the blunders of both the Bush and Obama administrations as they grappled with how to engage Iran, producing a series of both carrots and sticks. And he takes us inside the hotel suites where the 2015 nuclear agreement was negotiated, offering a frank assessment of the uncertain future of the U.S.-Iran relationship.This is a book rife with revelations, from the secret communications between the Obama administration and the Iranian government to dispatches from the front lines of the new field of financial warfare. For readers of Steve Coll's Ghost Wars and Lawrence Wright's The Looming Tower, The Iran Wars exposes the hidden history of a conflict most Americans don't even realize is being fought, but whose outcome could have far-reaching geopolitical implications.Praise for The Iran Wars "The use of the word 'wars, ' plural, in the title of this illuminating book tells the story: U.S.-Iranian relations have been troubled for many years. This deeply researched account of negotiations and their implications makes an important contribution to understanding the short- and long-term consequences of how we manage this difficult relationship."--George P. Shultz, former secretary of state "An illuminating, deeply reported account from one of the best journalists writing about the Middle East today. Jay Solomon's The Iran Wars offers a front-row view of the spy games, assassinations, political intrigue and high-stakes diplomacy that have defined relations with one of America's most cunning and dangerous foes."--Joby Warrick, Pulitzer Prize-winning author of Black Flags: The Rise of ISIS "A thorough yet concise survey of Iran's buildup of nuclear technology since the 1980s, its troubling exporting of Shiite insurgency in countries around it, and the changing American reaction. Wall Street Journal chief foreign affairs correspondent [Jay] Solomon offers an evenhanded look at the backdoor schemes involving the building of Iran's nuclear weapons and the world players involved in and against its machinations."--Kirkus Reviews (Starred Review)

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

American Diplomacy


George F. Kennan - 1951
    Kennan offers an informed, plain-spoken appraisal of United States foreign policy. His evaluations of diplomatic history and international relations cut to the heart of policy issues much debated today.This expanded edition retains the lectures and essays first published in 1951 as American Diplomacy, 1900-1950 and adds two lectures delivered in 1984 as well as a new preface by the author. In these additional pieces, Kennan explains how some of his ideas have changed over the years. He confronts the events and topics that have come to occupy American opinion in the last thirty years, including the development and significance of the Cold War, the escalation of the nuclear arms race, and the American involvement in Vietnam."A book about foreign policy by a man who really knows something about foreign policy."—James Reston,New York Times Book Review"These celebrated lectures, delivered at the University of Chicago in 1950, were for many years the most widely read account of American diplomacy in the first half of the twentieth century. . . . The second edition of the work contains two lectures from 1984 that reconsider the themes of American Diplomacy"—Foreign Affairs, Significant Books of the Last 75 Years.

The New Digital Age: Reshaping the Future of People, Nations and Business


Eric Schmidt - 2013
    And, the Director of Google Ideas, Jared Cohen, formerly an advisor to both Secretaries of State Condoleezza Rice and Hillary Clinton.Never before has the future been so vividly and transparently imagined. From technologies that will change lives (information systems that greatly increase productivity, safety and our quality of life, thought controlled motion technology that can revolutionize medical procedures, and near-perfect translation technology that allows us to have more diversified interactions) to our most important future considerations (curating our online identity and fighting those who would do harm with it) to the widespread political change that will transform the globe (through transformations in conflict, increasingly active and global citizenries, a new wave of cyber-terrorism and states operating simultaneously in the physical and virtual realms) to the ever present threats to our privacy and security, Schmidt and Cohen outline in great detail and scope all the promise and peril awaiting us in the coming decades.

For the Soul of Mankind: The United States, the Soviet Union, and the Cold War


Melvyn P. Leffler - 2007
    How did that happen? What caused the cold war in the first place, and why did it last as long as it did?The distinguished historian Melvyn P. Leffler homes in on four crucial episodes when American and Soviet leaders considered modulating, avoiding, or ending hostilities and asks why they failed: Stalin and Truman devising new policies after 1945; Malenkov and Eisenhower exploring the chance for peace after Stalin’s death in 1953; Kennedy, Khrushchev, and LBJ trying to reduce tensions after the Cuban Missile Crisis of 1962; and Brezhnev and Carter aiming to sustain détente after the Helsinki Conference of 1975. All these leaders glimpsed possibilities for peace, yet they allowed ideologies, political pressures, the expectations of allies and clients, the dynamics of the international system, and their own fearful memories to trap them in a cycle of hostility that seemed to have no end.Leffler’s important book illuminates how Reagan, Bush, and, above all, Gorbachev finally extricated themselves from the policies and mind-sets that had imprisoned their predecessors, and were able to reconfigure Soviet-American relations after decades of confrontation.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism


Robert B. Baer - 2002
    This riveting book is both an indictment of an agency that lost its way and an unprecedented look at the roots of modern terrorism, and includes a new afterword in which Baer speaks out about the American war on terrorism and its profound implications throughout the Middle East.“Robert Baer was considered perhaps the best on-the-ground field officer in the Middle East.”–Seymour M. Hersh, The New YorkerFrom The PrefaceThis book is a memoir of one foot soldier’s career in the other cold war, the one against terrorist networks. It’s a story about places most Americans will never travel to, about people many Americans would prefer to think we don’t need to do business with.This memoir, I hope, will show the reader how spying is supposed to work, where the CIA lost its way, and how we can bring it back again. But I hope this book will accomplish one more purpose as well: I hope it will show why I am angry about what happened to the CIA. And I want to show why every American and everyone who cares about the preservation of this country should be angry and alarmed, too.The CIA was systematically destroyed by political correctness, by petty Beltway wars, by careerism, and much more. At a time when terrorist threats were compounding globally, the agency that should have been monitoring them was being scrubbed clean instead. Americans were making too much money to bother. Life was good. The White House and the National Security Council became cathedrals of commerce where the interests of big business outweighed the interests of protecting American citizens at home and abroad. Defanged and dispirited, the CIA went along for the ride. And then on September 11, 2001, the reckoning for such vast carelessness was presented for all the world to see.