By James Bamford

James Bamford uncovered the life of the top-secret nationwide safeguard enterprise within the bestselling The Puzzle Palace and endured to probe into its workings in his follow-up bestseller, physique of secrets and techniques. Now Bamford discloses inside of, frequently surprising information regarding the transformation of the NSA within the aftermath of the terrorist assaults of 2001. within the SHADOW manufacturing unit, Bamford exhibits how the NSA’s failure to become aware of the presence of 2 of the Sep 11 hijackers contained in the usa led the NSA to desert its long-held coverage of spying in simple terms on enemies outdoors the rustic. as a substitute, after September 11 it became its virtually unlimited skill to eavesdrop on good friend and foe alike over to the Bush management to exploit as a weapon within the conflict on terror. With unmatched entry to resources and records, Bamford information how the company has carried out household surveillance with out courtroom approval, and he frames it within the context of the NSA’s ongoing hunt for info approximately today’s elusive enemies. THE SHADOW manufacturing unit is a riveting learn for an individual all in favour of civil liberties and America’s defense within the post-9/11 international.

Show description

Read Online or Download The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America PDF

Similar intelligence & espionage books

Courting Disaster: How the CIA Kept America Safe and How Barack Obama Is Inviting the Next Attack

White apartment speechwriter Marc Thiessen used to be locked in a safe room and given entry to the main delicate intelligence whilst he was once tasked to write down President George W. Bush’s 2006 speech explaining the CIA’s interrogation application and why Congress should still authorize it. Few recognize extra approximately those CIA operations than Thiessen, and in his new publication, dating catastrophe, he files simply how powerful the CIA’s interrogations have been in foiling assaults on the USA, penetrating al-Qaeda’s excessive command, and supplying our army with actionable intelligence.

The Only Thing Worth Dying For: How Eleven Green Berets Forged a New Afghanistan

On a moonless evening simply weeks after September eleven, 2001, U. S. detailed Forces group ODA 574 infiltrates the mountains of southern Afghanistan with a likely most unlikely project: to foment a tribal insurrection and strength the Taliban to give up. Armed completely with the apparatus they could stick with it their backs, shockingly scant intelligence, and their mastery of guerrilla battle, Captain Jason Amerine and his males don't have any selection yet to belief their merely best friend, a little-known Pashtun statesman named Hamid Karzai who has lower back from exile and is being hunted by way of the Taliban as he travels the geographical region elevating a armed forces.

Operation Snow: How a Soviet Mole in FDR's White House Triggered Pearl Harbor

Lately declassified facts and never-before-translated records inform the true tale of the day that FDR memorably declared could stay in infamy, exploring how Joseph Stalin and the KGB used an enormous community of double brokers and communist sympathizers—most particularly Harry Dexter White—to lead Japan into struggle opposed to the us, featuring Soviet involvement at the back of the bombing of Pearl Harbor.

Intelligence and Intelligence Analysis

This ebook tracks publish Sept. 11 advancements in nationwide safeguard and policing intelligence and their relevance to new rising parts of intelligence perform comparable to: corrections, biosecurity, deepest and regulatory environments. advancements are explored thematically throughout 3 vast sections: using intelligence realizing buildings constructing a self-discipline.

Additional resources for The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America

Example text

On military bases, privates live with privates, majors live with majors, and generals live with generals. Inside was an eclectic mix of furniture: a shiny black cabinet from Korea, his last post, in the living room; a long, dark wood table in the dining room that probably came from a government warehouse; and a bedroom set upstairs that had banged around the world for a dozen or more years. In the back, protected by a flimsy carport, was the family’s only car, a dark blue Volvo. In the NSA’s Ops 2B building, counterterrorism specialists continued reading the cryptic conversations between Mihdhar and the Yemen ops center that had been picked up while targeting the center.

All of them,” the operations officer told him. ” Hayden was in disbelief. Every computer in the agency’s secret city—including those in its two-story supercomputer facility—had suddenly crashed and could not be restarted. m. in Washington, it was midnight deep within the computers, which operate on Greenwich Mean Time. For some reason, at that moment a piece of software snapped, setting off the enormous shutdown. “It was the whole net by which we move, use, abuse, process— everything we do with information here at Fort Meade went down,” said Hayden.

He destroyed his Yemen passport, changed his name to Mohdar Mohamed Abdoulah, and applied for asylum at a local immigration office. He was from Somalia, he told them, where he had been subject to harsh persecution. Eventually granted asylum, Mihdhar Zaid enrolled in computer studies at a small local school, Grossmont Community College. Passing through airport immigration control, Mihdhar and Hazmi indicated that they would be staying at the Sheraton Hotel in Los Angeles. But they never showed up.

Download PDF sample

Rated 4.21 of 5 – based on 25 votes