This book specifically covers British, American, Soviet, and Israeli intelligence and deals mainly with the Cold War period. Many intelligence services utilize or try to sidestep the honeytrap, which can take many forms in terms of its motivation, techniques, and results. Despite necessary precautions, some people still fall right into the trap. They are not oblivious of the danger, but human nature lures them into the trap. Stories of the highest dignitaries of countries, generals, professionals, lonely secretaries, and diplomats caught in meticulously planned and flawlessly executed honeytraps are demonstrated in this book. In addition to new terms (e.g., sexual warfare, medi-trap, travel-trap), many distinguishing examples, such as an improvised counter-measure by a Japanese attaché against honeytraps in a Moscow hotel room, perils of casual encounters with women, methods for reducing entrapment, gender roles in honeytraps, the danger to both genders and tragic cases throughout history are also demonstrated in this book. Sources mostly in English have been perused and translated. Some sources in Spanish and German were also examined. Interviews with a police chief and a law enforcement official are also included in the book. Most of the stories mentioned are based on real events and people. Although some sources consist of imaginary stories, they were considered valuable information and mentioned in the book.
In Spymaster’s Prism the legendary former spymaster Jack Devine details the unending struggle with Russia and its intelligence agencies as it works against our national security. Devine tells this story through the unique perspective of a seasoned CIA professional who served more than three decades, some at the highest levels of the agency. He uses his gimlet-eyed view to walk us through the fascinating spy cases and covert action activities of Russia, not only through the Cold War past but up to and including its interference in the Trump era. Devine also looks over the horizon to see what lies ahead in this struggle and provides prescriptions for the future. Based on personal experience and exhaustive research, Devine builds a vivid and complex mosaic that illustrates how Russia’s intelligence activities have continued uninterrupted throughout modern history, using fundamentally identical policies and techniques to undermine our democracy. He shows in stark terms how intelligence has been modernized and weaponized through the power of the cyber world. Devine presents his analysis using clear-eyed vision and a repertoire of better-than-fiction spy stories, giving us an objective, riveting, and candid take on U.S.-Russia relations. He offers key lessons from our intelligence successes and failures over the past seventy-five years that will help us determine how to address our current strategic shortfall, emerge ahead of the Russians, and be prepared for what’s to come from any adversary.
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain. In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before. You’ll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation. After reading this book, you will be able to Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them Install and configure Honeyd to simulate multiple operating systems, services, and network environments Use virtual honeypots to capture worms, bots, and other malware Create high-performance "hybrid" honeypots that draw on technologies from both low- and high-interaction honeypots Implement client honeypots that actively seek out dangerous Internet locations Understand how attackers identify and circumvent honeypots Analyze the botnets your honeypot identifies, and the malware it captures Preview the future evolution of both virtual and physical honeypots
From the bestselling author of The Day of the Jackal, international master of intrigue Frederick Forsyth, comes a thriller that brilliantly blends fact with fiction for one of this summer’s—or any season’s—most explosive reads! From the behind-the-scenes decision-making of the Allies to the secret meetings of Saddam Hussein’s war cabinet, from the brave American fliers running their dangerous missions over Iraq to the heroic young spy planted deep in the heart of Baghdad, Forsyth’s incomparable storytelling skill keeps the suspense at a breakneck pace. Somewhere in Baghdad is the mysterious “Jericho,” the traitor who is willing—for a price—to reveal what is going on in the high councils of the Iraqi dictator. But Saddam’s ultimate weapon has been kept secret even from his most trusted advisers, and the nightmare scenario that haunts General Schwarzkopf and his colleagues is suddenly imminent, unless somehow, the spy can locate that weapon—The Fist of God—in time. Peopled with vivid characters, brilliantly displaying Forsyth’s incomparable, knowledge of intelligence operations and tradecraft, moving back and forth between Washington and London, Baghdad and Kuwait, desert vastnesses and city bazaars, this breathtaking novel is an utterly convincing story of what may actually have happened behind the headlines.
In the darkest days of the Nazi occupation of the Netherlands, Anna-Maria van der Vaart sheltered Allied pilots, gave refuge to persecuted Jews and participated in audacious acts of sabotage. She survived when others did not, a witness to their courage and to the terrible treachery that betrayed so many of them to the Nazis. Tens of thousands of Dutchmen elected to fight with the Germans, while many civilians turned over their Jewish neighbours to an almost certain death. Holland’s Jewish leaders prevaricated, hoping to save their people and their own skins. But the exploits of the Dutch Resistance produced unimaginable heroism and unparalleled self-sacrifice. A chance meeting with Martin Sixsmith in 2019 led to Anna-Maria telling him her story. In Dutch and German archives, interviews with survivors, personal diaries and contentious memoirs by those with things to hide, Sixsmith came across a drama on a scale he could never have imagined. My Sins Go with Me is a story of remarkable bravery, and of cowardice and betrayal in the hardest of times.
DIVDIVA tour de force account of seduction, power, and betrayal in the biggest political sex scandal of its age/divDIV The Profumo Affair rocked the British establishment like no scandal before or since. The Tory war minister, John Profumo, had taken up with a teenager named Christine Keeler, who was also sleeping with a Soviet intelligence agent. The ensuing inquiry revealed a hidden underworld in which men of the ruling classes and politicians cavorted with prostitutes at orgies. The revelations shook the British government and sent shock waves all the way to the Kennedy White House. The man at the center of the storm was Dr. Stephen Ward./divDIV Ward was a successful doctor to the rich and powerful, a talented artist who drew portraits of many of his famous patients and fixed up prominent men with young women. He was also a pawn, ruthlessly exploited by the intelligence agencies. When the Profumo Affair threatened the government, Ward became a scapegoat, hounded to death—and perhaps murdered./divDIV For the first time, The Secret Worlds of Stephen Ward reveals the names that could not be exposed and the truths that could not be told until now./divDIV/div/div
In a surprising number of espionage cases sex has played a significant role_often only in the background_possibly as a reason why a particular individual has lived beyond his means and is in desperate need of cash. FBI agent Earl Pitts sold secrets to the Soviets to ease his financial burdens, which came from his habitually heavy use of male and female prostitutes. Yuri Nosenko collaborated with the CIA after having misappropriated KGB funds to entertain expensive women while on official duties in Geneva, and Aleksandr Ogorodnik of the Soviet foreign ministry was persuaded to become a spy by his pregnant Spanish lover, an agent recruited by the CIA. In the realm of human behavior, sex can be the catalyst for risky or reckless conduct. The Historical Dictionary of Sexspionage explores this behavior through a chronology, an introduction, a bibliography, and hundreds of cross-referenced dictionary entries on the secret agencies, operations, and events. From Delilah's seduction of Samson in 1161 BC to State Department official Donald Keyser's conviction of passing secrets to Isabelle Cheng, a Taiwanese intelligence officer, in 2007, Nigel West recounts the history of sexspionage.
SHORTLISTED FOR THE PUSHKIN HOUSE PRIZE 'The most formidable spy in history' IAN FLEMING 'His work was impeccable' KIM PHILBY 'The spy to end spies' JOHN LE CARRÉ Born of a German father and a Russian mother, Richard Sorge moved in a world of shifting alliances and infinite possibility. In the years leading up to and during the Second World War, he became a fanatical communist – and the Soviet Union's most formidable spy. Combining charm with ruthless manipulation, he infiltrated and influenced the highest echelons of German, Chinese and Japanese society. His intelligence proved pivotal to the Soviet counter-offensive in the Battle of Moscow, which in turn determined the outcome of the war itself. Drawing on a wealth of declassified Soviet archives, this is a major biography of one of the greatest spies who ever lived.