Résultats de recherche de titre
Articles 1 à 20 sur 62
El jefe de los espías: El archivo secreto de Emilio A. Manglano, consejero del Rey y Director del CESID
Par Juan Fernández-Miranda, Javier Chicote Lerena. 2021
Una investigación explosiva que desvelará la historia de España,desde el 23-F y la caída de la UCD hasta el felipismo…
y la consolidación de José María Aznar. La fuente de este riguroso y minucioso trabajo de investigación periodística es el archivo personal de Emilio Alonso Manglano, director del CESID entre 1981 y 1995: sus agendas, sus cuadernos de notas y los informes de inteligencia que guardó: una investigación de varios años repleta de secretos y ocultismo sobre el contenido de más de 200 kilos de documentos que desentrañan la historia nunca contada de España. Personajes como el Rey Juan Carlos, Adolfo Suárez, Mario Conde, Felipe González o Margarita Robles son algunos de los muchos protagonistas de este libro. Reseñas:«Una contribución periodística e histórica de gran relevancia. Ofrece una perspectiva inédita de la España de los años 80 y 90 y arroja luz directa sobre momentos claves de nuestra Historia.»ABC «Un libro que cuestionará algunas de las versiones que se han tenido por ciertas de ese turbio periodo de la reciente historia de España que fue el felipismo.»Fernando Palmero, El Mundo«Los apuntes del militar ponen al desnudo la realidad incorrecta, miserable y en ocasiones delictiva, manejada por los gestores de la seguridad nacional.»Juan Luis Cebrián, El País «Un carboncillo muy bien hecho –porque la cosa es oscura– de las cloacas del felipismo. Está escritocomo en las películas: en equipo, de madrugada, con material exclusivo y el poder vigilando.»Daniel Ramírez, El Español «Un apasionante libro, una investigaciónde largo alcance que desvela oscuros capítulos de la historia de España.»Azahara Villacorta, El Comercio «El jefe de los espías causa a veces desasosiego, pero nunca indefensión. Nos deja un poco más solos y más huérfanos en su complejidad, pero nos distingue del rebaño de la humillación y saber lo que no sabíamos nos hace mejores y nos permite tener una visión más nítida y menos fanática de nuestra historia y de nosotros mismos.»Salvador Sostres, ABC«Lo recomiendo mucho.»Pilar Eyre, periodista y escritora «Es un libro de categoría donde hay reflexiones muy positivas y muy negativas de Manglano.»Luis María Anson «Tiene un índice suculento, con el que cualquiera quedaría enganchado.»Pedro J. Ramírez «Fernández-Miranday Chicote han hecho un gran servicio al país y, en particular, a los historiadores.»Javier Carrasco, Castellón Plaza «El enfrentamiento de Juan Carlos con Suárez y los fondos secretos que recibió de Arabia Saudí durante décadas quedan confirmados.»Iñigo Sáenz de Ugarte, eldiarioes «El libro es muy jugoso. Un repaso de la historia reciente de España.»Fernando de Haro, La tarde COPE«Un documento imprescindible para entender el presente.»Publishers Weekly «Una investigación que aporta datos inéditos de la historia de España.»Servimedia «El volumen saca a la luz el archivo secreto de Emilio Manglano, consejero del rey y director del CESID durante 14 años. Era el jefe del espionaje,el hombre más informado de España. Lo sabía todo. Y lo documentó todo.»Juan Luis Galiacho, El Cierre Digital «Apasionante libro.»Jorge Alacid, Las ProvinciasThe Secret War for the Union: The Untold Story of Military Intelligence in the Civil War
Par Edwin C. Fishel. 2014
&“A treasure trove for historians . . . A real addition to Civil War history&” (Kirkus Reviews, starred review). At the end…
of the American Civil War, most of the intelligence records disappeared—remaining hidden for over a century. As a result, little has been understood about the role of espionage and other intelligence sources, from balloonists to signalmen with their telescopes. When, at the National Archives, Edwin C. Fishel discovered long-forgotten documents—the operational files of the Army of the Potomac&’s Bureau of Military Information—he had the makings of this, the first book to thoroughly and authentically examine the impact of intelligence on the Civil War, providing a new perspective on this period in history. Drawing on these papers as well as over a thousand pages of reports by General McClellan&’s intelligence chief, the detective Allan Pinkerton, and other information, he created an account of the Civil War that &“breaks much new ground&” (The New York Times). &“The former chief intelligence reporter for the National Security Agency brings his professional expertise to bear in this detailed analysis, which makes a notable contribution to Civil War literature as the first major study to present the war&’s campaigns from an intelligence perspective. Focusing on intelligence work in the eastern theater, 1861–1863, Fishel plays down the role of individual agents like James Longstreet&’s famous &‘scout,&’ Henry Harrison, concentrating instead on the increasingly sophisticated development of intelligence systems by both sides. . . . Expertly written, organized and researched.&” —Publishers Weekly &“Fundamentally changes our picture of the secret service in the Civil War.&” —The Washington PostIntelligence and Strategic Culture
Par Duyvesteyn Isabelle. 2013
Reliable information on potential security threats is not just the result of diligent intelligence work but also a product of…
context and culture. The volume explores the nexus between the intelligence process and strategic culture. How can and does the strategic outlook of the United States and the United Kingdom in particular, influence the intelligence gathering, assessment and dissemination process? This book contains an assessment of how political agendas and ideological outlook have significant influence on both the content and process of intelligence. It looks in particular at the premise of hearts and minds policies, culture and intelligence gathering in counterinsurgency operations; at case studies from imperial Malaya and Iran in the 1950s and at instances of intelligence failure, e.g. the case of Iraq in 2003. How was intelligence, or the lack thereof, a product of political culture and how did it play a role in the political praxis? The book shows that political agendas and the ideological outlook have a significant influence upon both the content and process of intelligence. This book was originally published as a special issue of Intelligence and National Security.Breaking And Entering: The Extraordinary Story of a Hacker Called “Alien”
Par Jeremy N. Smith. 2020
A Bookish Must Read for 2019 An Amazon Best Book of the Month Featured on NBC's TODAY and Nightly News …
&“Smith&’s writing style…is crisp as he charts the course of Alien&’s life in a series of vignettes from uncertain undergraduate to successful business owner. The structure works because Smith is a lively storyteller.&” —The New York Times Book Review "Amusing and cautionary tale."—WORLD Magazine &“A fascinating look at hacking and the cybersecurity industry that has evolved. Alien is one bad-ass woman!&” —The Missoulian &“A book that reads like a fictional thriller while remaining solidly grounded in fact...effortless to read, Breaking and Entering is an engaging cautionary tale of security vulnerabilities and the constant threat of cyber attacks that businesses and institutions face on a daily basis. Knowing that our own personal security hangs in the balance, we can&’t help but feel glad that &“white hat hackers&” such as Alien are out there doing their best to stem the tide."—New York Journal of Books &“A novelistic tech tale that puts readers on the front lines of cybersecurity. For all whose lives and connections depend on the internet—nearly everyone—this biography of the pseudonymous &‘Alien&’ provides a fast-paced cautionary tale. Jeremy Smith has enough experience as a computer programmer to understand the technicalities of this world, but his storytelling makes it intelligible to general readers; indeed, the narrative is more character-driven than technology-driven.... Smith goes into great detail to demonstrate how Alien could penetrate the security of whomever was employing her, showing how a real criminal would do it, and makes fearfully clear that there is &‘no such thing as absolute security in this world, or any definitive and final fixes.&’ A page-turning real-life thriller, this is the sort of book that may leave readers feeling both invigorated and vulnerable.&” —Kirkus Reviews (starred review) "A fascinating and riveting account...like an espionage thriller, this account ensnares readers into the high-stakes world of computer security, told through Alien&’s emergence as a recognized expert in a male-dominate profession." —Library Journal "This riveting book follows Alien as she transforms herself from a young woman up for pretty much any challenge, no matter how dangerous, to a woman who is among the best in the world at what she does. Freelance journalist Smith writes with gusto, giving Alien&’s story the feel of a novel (or, perhaps, a movie along the lines of 1995&’s Hackers). The world of hacking and cybersecurity still carries a mystique; only the privileged few are permitted to learn the secrets that lie within the close-knit hacker community. This book opens the gates and invites readers inside." —Booklist &“Scintillating.... Alien&’s mindset and exploits epitomize the spirit of hacking—a dogged perseverance directed at outsmarting and outwitting barriers of any kind.... An unabashedly human and humane portrait of a brilliant hacker.&” —Gabriella Coleman, author of Hacker, Hoaxer, Whistleblower, Spy &“In Breaking and Entering, Jeremy Smith reveals the human side of cybersecurity. The book covers the vast spectrum of why and how hackers do what they do. A great thriller!&” —Paul de SouzaHomeland Security and Criminal Justice: Five Years After 9/11
Par Everette B. Penn. 2008
No event has shaped international events of recent years more than the terrorist attacks of September 11, 2001. Tragically, less…
than four years later, Hurricane Katrina devastated the Gulf Coast. In less than five years, the United States has experienced its worst terrorist attack and worst natural disaster, both in terms of the number of lives lost and in the costs needed for reconstruction. Both events have clearly indicated that there are tremendous threats to the security and well-being of Americans in their own country. Furthermore, these events have demonstrated the importance of criminal-justice agencies who are the first responders to threats to the United States. Since the threats of further terrorist attacks, natural disasters, epidemics, and cybercrime continue to lurk as potential dangers to the United States homeland, the American Criminal Justice System must be committed to mitigating, preparing for, responding to, and recovering from these tragic events. In addition, its commitment must be steadfast and ubiquitous. This highly topical book analyzes the nexus of homeland security to the discipline of criminal justice by addressing, in depth, issues and challenges facing criminal-justice students, practitioners, and faculty in the burgeoning field of homeland security.This book was previously published as a special issue of Criminal Justice Studies.Big Data, Emerging Technologies and Intelligence: National Security Disrupted (Studies in Intelligence)
Par Miah Hammond-Errey. 2024
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how the…
big data landscape and the emerging technologies it fuels are impacting national security. This book illustrates that big data is transforming intelligence production as well as changing the national security environment broadly, including what is considered a part of national security as well as the relationships agencies have with the public. The book highlights the impact of big data on intelligence production and national security from the perspective of Australian national security leaders and practitioners, and the research is based on empirical data collection, with insights from nearly 50 participants from within Australia’s National Intelligence Community. It argues that big data is transforming intelligence and national security and shows that the impacts of big data on the knowledge, activities and organisation of intelligence agencies is challenging some foundational intelligence principles, including the distinction between foreign and domestic intelligence collection. Furthermore, the book argues that big data has created emerging threats to national security; for example, it enables invasive targeting and surveillance, drives information warfare as well as social and political interference, and challenges the existing models of harm assessment used in national security. The book maps broad areas of change for intelligence agencies in the national security context and what they mean for intelligence communities, and explores how intelligence agencies look out to the rest of society, considering specific impacts relating to privacy, ethics and trust. This book will be of much interest to students of intelligence studies, technology studies, national security and International Relations.Narcotopia: In Search of the Asian Drug Cartel That Survived the CIA
Par Patrick Winn. 2024
The gripping true story of an indigenous people running the world&’s mightiest narco-state—and America&’s struggle to thwart them. In Asia&’s…
narcotics-producing heartland, the Wa reign supreme. They dominate the Golden Triangle, a mountainous stretch of Burma between Thailand and China. Their 30,000-strong army, wielding missiles and attack drones, makes Mexican cartels look like street gangs. Wa moguls are unrivaled in the region&’s $60 billion meth trade and infamous for mass-producing pink, vanilla-scented speed pills. Drugs finance Wa State, a bona fide nation with its own laws, anthems, schools, and electricity grid. Though revered by their people, Wa leaders are scorned by US policymakers as vicious &“kingpins&” who &“poison our society for profit.&” In Narcotopia, award-winning journalist Patrick Winn uncovers the truth behind Asia&’s top drug-trafficking organization, as told by a Wa commander turned DEA informant. This gripping narrative shreds drug war myths and leads to a chilling revelation: the Wa syndicate&’s origins are smudged with CIA fingerprints. This is a saga of native people tapping the power of narcotics to create a nation where there was none before — and covert US intelligence operations gone wrong.The NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.Secret Reports on Nazi Germany: The Frankfurt School Contribution to the War Effort
Par Franz Neumann, Herbert Marcuse, Otto Kirchheimer. 2013
A groundbreaking book that gathers key wartime intelligence reportsDuring the Second World War, three prominent members of the Frankfurt School—Franz…
Neumann, Herbert Marcuse, and Otto Kirchheimer—worked as intelligence analysts for the Office of Strategic Services, the wartime forerunner of the CIA. This book brings together their most important intelligence reports on Nazi Germany, most of them published here for the first time.These reports provide a fresh perspective on Hitler's regime and the Second World War, and a fascinating window on Frankfurt School critical theory. They develop a detailed analysis of Nazism as a social and economic system and the role of anti-Semitism in Nazism, as well as a coherent plan for the reconstruction of postwar Germany as a democratic political system with a socialist economy. These reports played a significant role in the development of postwar Allied policy, including denazification and the preparation of the Nuremberg Trials. They also reveal how wartime intelligence analysis shaped the intellectual agendas of these three important German-Jewish scholars who fled Nazi persecution prior to the war.Secret Reports on Nazi Germany features a foreword by Raymond Geuss as well as a comprehensive general introduction by Raffaele Laudani that puts these writings in historical and intellectual context.John Lisle reveals the untold story of the OSS Research and Development Branch—The Dirty Tricks Department—and its role in World…
War II.In the summer of 1942, Stanley Lovell, a renowned industrial chemist, received a mysterious order to report to an unfamiliar building in Washington, D.C. When he arrived, he was led to a barren room where he waited to meet the man who had summoned him. After a disconcerting amount of time, William “Wild Bill” Donovan, the head of the Office of Strategic Services (OSS), walked in the door. “You know your Sherlock Holmes, of course,” Donovan said as an introduction. “Professor Moriarty is the man I want for my staff…I think you’re it.”Following this life-changing encounter, Lovell became the head of a secret group of scientists who developed dirty tricks for the OSS, the precursor to the CIA. Their inventions included Bat Bombs, suicide pills, fighting knives, silent pistols, and camouflaged explosives. Moreover, they forged documents for undercover agents, plotted the assassination of foreign leaders, and performed truth drug experiments on unsuspecting subjects.Based on extensive archival research and personal interviews, The Dirty Tricks Department tells the story of these scheming scientists, explores the moral dilemmas that they faced, and reveals their dark legacy of directly inspiring the most infamous program in CIA history: MKULTRA.Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)
Par David V. Gioe, Margaret W. Smith. 2024
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century. This book…
focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the information environment and cyberspace, and the volume articulates the Russian and Chinese strategies to elevate cyber and information competition to a central position. Western governments and, in particular, the U.S. government have long conceived of a war–peace duality, but that perspective is giving way to a more nuanced perception of competition. This volume goes beyond analyzing the problems prevalent in the information space and offers a roadmap for Western powers to compete in and protect the global information environment from malicious actors. Its genesis is rooted in the proposition that it is time for the West to push back against aggression and that it needs a relevant framework and tools to do so. The book demonstrates that Western democratic states currently lack both the strategic and intellectual acumen to compete and win in the information and cyber domains, and argues that the West needs a strategy to compete with near-peer powers in information and cyber warfare. This book will be of much interest to students of cyber-warfare, information warfare, defense studies, and international relations in general, as well as practitioners.Cashing Out: The Flight of Nazi Treasure, 1945–1948
Par Neill Lochery. 2023
When Nazis looked to flee Europe with stolen art, gems, and gold in tow, certain &“neutral&” countries were all too…
willing to assist them. By the end of January 1945, it was clear to Germany that the war was lost. The Third Reich was in freefall, and its leaders, apart from those clustered around Hitler in his Berlin bunker, sought to abscond before they were besieged. But they wanted to take their wealth with them. Their escape routes were diverse: Sweden and Switzerland boasted proximity, banking, and industrial closeness, while Spain and Portugal offered an inviting Atlantic coastline and shipping routes to South America. And in various ways, each of these so-called neutral nations welcomed the Nazi escapees, along with the clandestine wealth they carried. Cashing Out tells the riveting history of the race to intercept the stolen assets before they disappeared, and before the will to punish Germany was replaced by the political considerations of the fast-approaching Cold War. Bestselling author Neill Lochery here brilliantly recounts the flight of the Nazi-looted riches—the last great escape of World War II—and the Allied quest for justice.Ethical Hacking (Law, Technology and Media)
Par Alana Maurushat. 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral…
and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne. L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils. Ce livre est publié en anglais.A Woman of No Importance: The Untold Story of Virginia Hall, WWII's Most Dangerous Spy
Par Sonia Purnell. 2019
'A METICULOUS HISTORY THAT READS LIKE A THRILLER' BEN MACINTYRE, TEN BEST BOOKS TO READ ABOUT WORLD WAR II An…
astounding story of heroism, spycraft, resistance and personal triumph over shocking adversity. 'A rousing tale of derring-do' THE TIMES * 'Riveting' MICK HERRON * 'Superb' IRISH TIMES THE NEW YORK TIMES BESTSELLERIn September 1941, a young American woman strides up the steps of a hotel in Lyon, Vichy France. Her papers say she is a journalist. Her wooden leg is disguised by a determined gait and a distracting beauty. She is there to spark the resistance.By 1942 Virginia Hall was the Gestapo's most urgent target, having infiltrated Vichy command, trained civilians in guerrilla warfare and sprung soldiers from Nazi prison camps. The first woman to go undercover for British SOE, her intelligence changed the course of the war - but her fight was still not over. This is a spy history like no other, telling the story of the hunting accident that disabled her, the discrimination she fought and the secret life that helped her triumph over shocking adversity.'A cracking story about an extraordinarily brave woman' TELEGRAPH'Gripping ... superb ... a rounded portrait of a complicated, resourceful, determined and above all brave woman' IRISH TIMESWINNER of the PLUTARCH AWARD FOR BEST BIOGRAPHYA former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake…
news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.Spooked: The Trump Dossier, Black Cube, and the Rise of Private Spies
Par Barry Meier. 2021
A Pulitzer Prize winning investigative journalist’s journey into a billon-dollar secret industry that is shaping our world – the booming…
business of private spying, operatives-for-hire retained by companies, political parties and the powerful to dig up dirt on their enemies and, if need be, destroy them. For decades, private eyes from Allan Pinkerton, who formed the first detective agency in the U.S., to Jules Kroll, who transformed the investigations business by giving it a corporate veneer, private spies were content to stand in the shadows. Now, that is all changing. High-profile stories grabbing recent headlines – the Steele Dossier, Black Cube, the Theranos scandal, Harvey Weinstein’s attacks on his accusers – all share a common thread, the involvement of private spies. Today, operatives-for-hire are influencing presidential elections, the news media, government policies and the fortunes of companies.. They are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails, and decide what we see on social media. Private spying has never been cheaper and the business has never been more lucrative—just as its power has never been more pervasive. Spooked is a fast-paced, disturbing and, at times, hilarious tour through the shadowlands of private spying and its inhabitants, a grab-bag collection of ex-intelligence operatives, former journalists and lost souls. In this hidden world, information is currency, double-crosses are commonplace, and hacking can be standard procedure. Drawing on his journalistic expertise and unique access to sources, Barry Meier uncovers the secrets private spies want to keep hidden.