Résultats de recherche de titre
Articles 1 à 20 sur 91
Beverly hills spy: The double-agent war hero who helped japan attack pearl harbor
Par Ronald Drabkin. 2024
In the spirit of Ben Macintyre's greatest spy nonfiction, the truly unbelievable and untold story of Frederick Rutland—a debonair British…
WWI hero, flying ace, fixture of Los Angeles society, and friend of Golden Age Hollywood stars—who flipped to become a spy for Japan in the lead-up to the attack on Pearl Harbor. Frederick Rutland was an accomplished aviator, British WWI war hero, and real-life James Bond. He was the first pilot to take off and land a plane on a ship, a decorated warrior for his feats of bravery and rescue, was trusted by the admirals of the Royal Navy, had a succession of aeronautical inventions, and designed the first modern aircraft carrier. He was perhaps the most famous early twentieth-century naval aviator. Despite all of this, and due mostly to class politics, Rutland was not promoted in the new Royal Air Force in the wake of WWI. This ignominy led the disgruntled Rutland to become a spy for the Japanese navy. Plied with riches and given a salary ten times the highest-paid admiral, shuttled between Los Angeles and Tokyo where he lived in large mansions in both Beverly Hills and Yokohama, and insinuating himself into both LA high society and Japan's high command, Rutland would go on to contribute to the Japanese navy with both strategic and technical intelligence. This included scouting trips to Pearl Harbor, investigations of military preparedness, and aircraft technology. All this while living a double life, frequenting private California clubs and hosting lavish affairs for Hollywood stars and military dignitaries in his mansion on the Los Angeles Bird Streets. Supported by recently declassified FBI files and by incorporating unique and rare research through MI5 and Japanese Naval archives that few English speakers have access to, author Ronald Drabkin pieces together to completion, for the first time, this stranger-than-fiction story of one of the most fascinating and enigmatic characters of espionage history. Supplemental enhancement PDF accompanies the audiobookBig Data, Emerging Technologies and Intelligence: National Security Disrupted (Studies in Intelligence)
Par Miah Hammond-Errey. 2024
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how the…
big data landscape and the emerging technologies it fuels are impacting national security. This book illustrates that big data is transforming intelligence production as well as changing the national security environment broadly, including what is considered a part of national security as well as the relationships agencies have with the public. The book highlights the impact of big data on intelligence production and national security from the perspective of Australian national security leaders and practitioners, and the research is based on empirical data collection, with insights from nearly 50 participants from within Australia’s National Intelligence Community. It argues that big data is transforming intelligence and national security and shows that the impacts of big data on the knowledge, activities and organisation of intelligence agencies is challenging some foundational intelligence principles, including the distinction between foreign and domestic intelligence collection. Furthermore, the book argues that big data has created emerging threats to national security; for example, it enables invasive targeting and surveillance, drives information warfare as well as social and political interference, and challenges the existing models of harm assessment used in national security. The book maps broad areas of change for intelligence agencies in the national security context and what they mean for intelligence communities, and explores how intelligence agencies look out to the rest of society, considering specific impacts relating to privacy, ethics and trust. This book will be of much interest to students of intelligence studies, technology studies, national security and International Relations.Narcotopia: In Search of the Asian Drug Cartel That Survived the CIA
Par Patrick Winn. 2024
The gripping true story of an indigenous people running the world&’s mightiest narco-state—and America&’s struggle to thwart them. In Asia&’s…
narcotics-producing heartland, the Wa reign supreme. They dominate the Golden Triangle, a mountainous stretch of Burma between Thailand and China. Their 30,000-strong army, wielding missiles and attack drones, makes Mexican cartels look like street gangs. Wa moguls are unrivaled in the region&’s $60 billion meth trade and infamous for mass-producing pink, vanilla-scented speed pills. Drugs finance Wa State, a bona fide nation with its own laws, anthems, schools, and electricity grid. Though revered by their people, Wa leaders are scorned by US policymakers as vicious &“kingpins&” who &“poison our society for profit.&” In Narcotopia, award-winning journalist Patrick Winn uncovers the truth behind Asia&’s top drug-trafficking organization, as told by a Wa commander turned DEA informant. This gripping narrative shreds drug war myths and leads to a chilling revelation: the Wa syndicate&’s origins are smudged with CIA fingerprints. This is a saga of native people tapping the power of narcotics to create a nation where there was none before — and covert US intelligence operations gone wrong.Disney Ideas Book: More than 100 Disney Crafts, Activities, and Games
Par Dk, Elizabeth Dowsett. 2018
Bring your love of Disney to life with more than 100 amazing and creative projects and activities.The perfect rainy-day gift…
for kids who love Disney and enjoy crafting. Let their imaginations run wild with more than 100 enchanting Disney inspired arts and crafts, party games, puzzles, papercraft and many more fun and practical activities. With stunning photography and clear step-by-step instructions, the Disney Ideas Book guides you through each exciting project, from growing grass hair on Frozen trolls and creating The Lion King animal masks to crafting festive Mickey Mouse hanging decorations and Winnie the Pooh party hats. There are top tips on every page to help make your creations a success, with handy templates provided at the back of the book. Featuring family favourite characters from animation and live-action movies and TV, including Frozen, Toy Story, Moana, Inside Out and Cinderella.The Complete Idiot's Guide Numerology Workbook: Reveal Essential Truths About Yourself, Your Loved Ones, and the World Around Yo
Par Katherine Gleason, Patricia Kirkman. 2009
Numerology holds the key to self-understand, foretelling the future-and strong sales... Numbers reveal essential truths about people, their loved ones,…
and the world around them. Here, readers learn how to observe those numbers, calculate their meanings, and interpret what they reveal. Through understanding all types of numbers (Core Numbers, Karma, Master, Pinnacles/Challenges, Passion, Balance, Personal Year, Universal Year), they can divine a roadmap to their future. • Readers can create forecasts and charts as they would astrological charts • The two Complete Idiot's Guides® numerology books are ideal for bundling togetherPaper Airplanes (Idiot's Guides)
Par Nick Robinson. 2016
Related to origami, paper airplanes originated from China and are toys devised entirely out of paper and adhesives (sometimes glue…
or tape) that utilize an aerodynamic shape to lift and soar. Idiot's Guides: Paper Airplanes features 20 of the coolest designs-- and offers easy-to-understand, step-by-step instructions. This book includes:- Step-by-step easy-to-understand illustrated folding instructions, including the level of cutting/folding difficulty, flight pattern, and durability levels to the corresponding airplanes. - 20 symmetric models, ranging in difficulty levels, which are illustrated within the colorful guide.- 80 sheets of eye-catching, pre-designed printed 8.5x11 paper for readers to practice with and create planes.- Cool backgrounds that highlight each of the airplane projects.1000 Hours Outside: Activities to Match Screen Time with Green Time
Par Ginny Yurich. 2022
Join the global movement and challenge your family to match screen time with outdoor time—with hundreds of fun, fresh-air ideas.Did…
you know that the average American child spends 1,200 hours a year in front of a screen? And that outside play can boost children in every area of development? This book has everything you need to reset the balance and swap screen time for outdoor fun! Challenge your family to spend 1,000 hours outside this year with this collection of games, crafts, and activities, organized by season to help you find something you can do every day. Play leaf pile games, take a hot chocolate hike, make corn husk dolls, go on an animal home hunt, and much more with hundreds of ideas for all ages, abilities, and family types.No matter how busy you are, this book gives you all the ideas, photos, activity instructions, and inspiration you need to get outdoors with your family all year round.LEGO Build Yourself Happy: The Joy of LEGO play
Par Abbie Headon. 2019
Release your inner child and build yourself happy with LEGO® bricks.Are you failing to find inner peace on a yoga…
mat? Does life feel like all work and no play?Having fun and getting creative can boost your mood and your well-being. So if you're looking for ways to unwind and make time for yourself, then let this book guide you on a LEGO® brick road to happiness.With more than 50 mindful LEGO building activities, discover how you can find balance, connect with friends and family, relax and improve your sleep habits.©2019 The LEGO Group.The NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.Secret Reports on Nazi Germany: The Frankfurt School Contribution to the War Effort
Par Franz Neumann, Herbert Marcuse, Otto Kirchheimer. 2013
A groundbreaking book that gathers key wartime intelligence reportsDuring the Second World War, three prominent members of the Frankfurt School—Franz…
Neumann, Herbert Marcuse, and Otto Kirchheimer—worked as intelligence analysts for the Office of Strategic Services, the wartime forerunner of the CIA. This book brings together their most important intelligence reports on Nazi Germany, most of them published here for the first time.These reports provide a fresh perspective on Hitler's regime and the Second World War, and a fascinating window on Frankfurt School critical theory. They develop a detailed analysis of Nazism as a social and economic system and the role of anti-Semitism in Nazism, as well as a coherent plan for the reconstruction of postwar Germany as a democratic political system with a socialist economy. These reports played a significant role in the development of postwar Allied policy, including denazification and the preparation of the Nuremberg Trials. They also reveal how wartime intelligence analysis shaped the intellectual agendas of these three important German-Jewish scholars who fled Nazi persecution prior to the war.Secret Reports on Nazi Germany features a foreword by Raymond Geuss as well as a comprehensive general introduction by Raffaele Laudani that puts these writings in historical and intellectual context.John Lisle reveals the untold story of the OSS Research and Development Branch—The Dirty Tricks Department—and its role in World…
War II.In the summer of 1942, Stanley Lovell, a renowned industrial chemist, received a mysterious order to report to an unfamiliar building in Washington, D.C. When he arrived, he was led to a barren room where he waited to meet the man who had summoned him. After a disconcerting amount of time, William “Wild Bill” Donovan, the head of the Office of Strategic Services (OSS), walked in the door. “You know your Sherlock Holmes, of course,” Donovan said as an introduction. “Professor Moriarty is the man I want for my staff…I think you’re it.”Following this life-changing encounter, Lovell became the head of a secret group of scientists who developed dirty tricks for the OSS, the precursor to the CIA. Their inventions included Bat Bombs, suicide pills, fighting knives, silent pistols, and camouflaged explosives. Moreover, they forged documents for undercover agents, plotted the assassination of foreign leaders, and performed truth drug experiments on unsuspecting subjects.Based on extensive archival research and personal interviews, The Dirty Tricks Department tells the story of these scheming scientists, explores the moral dilemmas that they faced, and reveals their dark legacy of directly inspiring the most infamous program in CIA history: MKULTRA.Minecraft Builder - Around the World: Independent and Unofficial
Par Mortimer Children'S Books. 2024
Travel the world in Minecraft! This easy-to-follow guide is filled with detailed instructions on how to make your own versions…
of the world's greatest landmarks. It includes straightforward instructions on how to build 13 different structures from around the world, including the Statue of Liberty, the Easter Island Heads, Sydney Opera House, Burj Khalifa, the Eiffel Tower, and many more.Builds range in difficulty, so there's something for every reader to try. Plus, every section is filled with cool info about the world's greatest wonders, meaning this is the perfect title for young learners. It's a fantastic way to combine geography, history and creativity into an amazing, fulfilling Minecraft experience.Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)
Par David V. Gioe, Margaret W. Smith. 2024
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century. This book…
focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the information environment and cyberspace, and the volume articulates the Russian and Chinese strategies to elevate cyber and information competition to a central position. Western governments and, in particular, the U.S. government have long conceived of a war–peace duality, but that perspective is giving way to a more nuanced perception of competition. This volume goes beyond analyzing the problems prevalent in the information space and offers a roadmap for Western powers to compete in and protect the global information environment from malicious actors. Its genesis is rooted in the proposition that it is time for the West to push back against aggression and that it needs a relevant framework and tools to do so. The book demonstrates that Western democratic states currently lack both the strategic and intellectual acumen to compete and win in the information and cyber domains, and argues that the West needs a strategy to compete with near-peer powers in information and cyber warfare. This book will be of much interest to students of cyber-warfare, information warfare, defense studies, and international relations in general, as well as practitioners.Body by God: The Owner's Manual for Maximized Living
Par Ben Lerner. 2003
Your body is by God. God preprogrammed you to look great, have outrageous health, and experience incredible happiness. In the…
human body, God created a perfect design, equipped with all the organs, tissues, and cells necessary for health, production, and reproduction. The problem, asserts Dr. Ben Lerner, is when we as humans interfere with God's design for our bodies. Junk food, high-stress living, and neglecting exercise are just a few of the things we do to hinder our bodies' performance.In Body by God, Dr. Lerner offers a comprehensive plan for getting in touch with our bodies in four areas: nutrition, exercise, stress management, and time management. His "5-in-5" plan is designed to instill the good habits that will lead to optimum health benefits. Readers will learn how to get in shape with 10-minute workouts, reprogram the way they react to stress, and more. "Owner's Manual Tips" give specific ways to apply the material to real life. Our bodies are "fearfully and wonderfully made." With the help of Body by God, readers will learn how to achieve the highest level of performance from God's handiwork.Cashing Out: The Flight of Nazi Treasure, 1945–1948
Par Neill Lochery. 2023
When Nazis looked to flee Europe with stolen art, gems, and gold in tow, certain &“neutral&” countries were all too…
willing to assist them. By the end of January 1945, it was clear to Germany that the war was lost. The Third Reich was in freefall, and its leaders, apart from those clustered around Hitler in his Berlin bunker, sought to abscond before they were besieged. But they wanted to take their wealth with them. Their escape routes were diverse: Sweden and Switzerland boasted proximity, banking, and industrial closeness, while Spain and Portugal offered an inviting Atlantic coastline and shipping routes to South America. And in various ways, each of these so-called neutral nations welcomed the Nazi escapees, along with the clandestine wealth they carried. Cashing Out tells the riveting history of the race to intercept the stolen assets before they disappeared, and before the will to punish Germany was replaced by the political considerations of the fast-approaching Cold War. Bestselling author Neill Lochery here brilliantly recounts the flight of the Nazi-looted riches—the last great escape of World War II—and the Allied quest for justice.Ethical Hacking (Law, Technology and Media)
Par Alana Maurushat. 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral…
and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne. L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils. Ce livre est publié en anglais.A Woman of No Importance: The Untold Story of Virginia Hall, WWII's Most Dangerous Spy
Par Sonia Purnell. 2019
'A METICULOUS HISTORY THAT READS LIKE A THRILLER' BEN MACINTYRE, TEN BEST BOOKS TO READ ABOUT WORLD WAR II An…
astounding story of heroism, spycraft, resistance and personal triumph over shocking adversity. 'A rousing tale of derring-do' THE TIMES * 'Riveting' MICK HERRON * 'Superb' IRISH TIMES THE NEW YORK TIMES BESTSELLERIn September 1941, a young American woman strides up the steps of a hotel in Lyon, Vichy France. Her papers say she is a journalist. Her wooden leg is disguised by a determined gait and a distracting beauty. She is there to spark the resistance.By 1942 Virginia Hall was the Gestapo's most urgent target, having infiltrated Vichy command, trained civilians in guerrilla warfare and sprung soldiers from Nazi prison camps. The first woman to go undercover for British SOE, her intelligence changed the course of the war - but her fight was still not over. This is a spy history like no other, telling the story of the hunting accident that disabled her, the discrimination she fought and the secret life that helped her triumph over shocking adversity.'A cracking story about an extraordinarily brave woman' TELEGRAPH'Gripping ... superb ... a rounded portrait of a complicated, resourceful, determined and above all brave woman' IRISH TIMESWINNER of the PLUTARCH AWARD FOR BEST BIOGRAPHYLet's Go to the Mall: A Seek-and-Find Trip Back to the ’80s
Par Sally Nixon. 2024
Put on your roller skates and relive the 1980s in this fantabulous activity book for adults and teens.This retro twist…
on the seek-and-find book features 20 radical scenes of life in the eighties. Explore burger joints, video rental stores, and high school lunch tables, keeping an eye out for fanny packs, cassette players, and other fun hidden objects along the way. Delightfully detailed illustrations offer hours of entertainment, turning a nostalgic childhood activity into a perfect way to unwind after work or chill out with friends.EIGHTIES NOSTALGIA: This is a perfect gift for adults who lived through the eighties and young people who are fascinated by retro aesthetics. Anyone who’s obsessed with the worlds of Stranger Things, Freaks and Geeks, and The Goldbergs will have endless fun poring over this activity book, which is full of clever references to the era. WHERE'S WALDO REIMAGINED: Revisit a classic childhood activity with a sophisticated twist. This modern update features 20 gorgeous, immersive, highly detailed scenes, woven together by a light narrative. It's a book you'll return to over and over, to admire the art and enjoy the retro atmosphere. ANALOG ACTIVITY: When you need a screen break and want to unplug, this book provides hours of fun as an individual activity or with a group of friends! Throw an eighties-themed party and work together on this seek-and-find for a totally tubular time.Perfect for:Activity book and puzzle fansFans of eighties aestheticsAdults nostalgic for their youth and young people captivated by retro trendsLogic and brain game enthusiastsAnyone looking for a fun group activity to share with family or friendsFans of Sally Nixon and Houseplants and Hot SauceIllustration loversA former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake…
news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.Spooked: The Trump Dossier, Black Cube, and the Rise of Private Spies
Par Barry Meier. 2021
A Pulitzer Prize winning investigative journalist’s journey into a billon-dollar secret industry that is shaping our world – the booming…
business of private spying, operatives-for-hire retained by companies, political parties and the powerful to dig up dirt on their enemies and, if need be, destroy them. For decades, private eyes from Allan Pinkerton, who formed the first detective agency in the U.S., to Jules Kroll, who transformed the investigations business by giving it a corporate veneer, private spies were content to stand in the shadows. Now, that is all changing. High-profile stories grabbing recent headlines – the Steele Dossier, Black Cube, the Theranos scandal, Harvey Weinstein’s attacks on his accusers – all share a common thread, the involvement of private spies. Today, operatives-for-hire are influencing presidential elections, the news media, government policies and the fortunes of companies.. They are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails, and decide what we see on social media. Private spying has never been cheaper and the business has never been more lucrative—just as its power has never been more pervasive. Spooked is a fast-paced, disturbing and, at times, hilarious tour through the shadowlands of private spying and its inhabitants, a grab-bag collection of ex-intelligence operatives, former journalists and lost souls. In this hidden world, information is currency, double-crosses are commonplace, and hacking can be standard procedure. Drawing on his journalistic expertise and unique access to sources, Barry Meier uncovers the secrets private spies want to keep hidden.