By Tim Lister, Morten Storm, Paul Cruickshank
Morten hurricane used to be an not likely Jihadi. A six-foot-one red-haired Dane, typhoon spent his adolescents out and in of difficulty. A booklet concerning the Prophet Mohammed caused his conversion to Islam, and typhoon sought goal in a neighborhood of believers. He attended a militant madrasah in Yemen, named his son Osama, and have become shut pals with Anwar al-Awlaki, the American-born terrorist cleric. yet after a decade of Jihadi existence, he not just repudiated extremism yet, in a quest for atonement, turned a double agent for the CIA and British and Danish intelligence.
Agent typhoon takes readers contained in the jihadist global like by no means prior to, displaying the everyday life of zealous males set on mass homicide, from dodging drones with al-Qaeda leaders within the Arabian wasteland to education in extremist gyms in Britain and appearing provide drops in Kenya. The booklet additionally presents a tantalizing examine his harmful lifestyles undercover, as hurricane traveled the realm for missions focusing on its most threatening terrorists , and into the world’s strongest secret agent firms: their tradecraft, rivalries, and late-night carousing, in addition to their ruthless use of an attractive blonde in an bold honey seize. Agent hurricane is a charming, totally precise, real-life espionage story.
Read or Download Agent Storm: My Life Inside al Qaeda and the CIA PDF
Similar terrorism books
For greater than a decade, the USA has been waging a brand new type of struggle opposed to the monetary networks of rogue regimes, proliferators, terrorist teams, and legal syndicates. Juan Zarate, a major architect of recent monetary battle and a former senior Treasury and White residence reliable, pulls again the curtain in this shadowy international.
Pyotr and Stavrogin are the leaders of a Russian innovative mobile. Their goal is to overthrow the Tsar, smash society and grab strength for themselves. jointly they educate terrorists who're keen to visit any lengths to accomplish their pursuits – no matter if the venture capability suicide. but if it sort of feels the crowd is set to be came upon, will their recruits be keen to kill one in every of their very own circle for you to disguise their tracks?
The pending expiration of the Terrorism probability assurance Act (TRIA) of 2002 is the impetus for this evaluate of the way TRIA redistributes terrorism losses, supporting to notify policymakers on even if to increase, adjust, or terminate it.
Whereas terrorism in agriculture takes few lives, the incorrect information rising from the rhetoric of anti-globalists, radical environmentalists, and animal welfare extremists expenses american citizens billions of bucks in misplaced source of revenue each year. This arguable quantity illuminates the political, financial, and worldwide results of those teams at the agricultural undefined.
- Terrorism: A Very Short Introduction (Very Short Introductions)
- An Evil Cradling
- Understanding Islamic Fundamentalism: The Theological and Ideological Basis of al-Qa‘ida's Political Tactics
- Global terrorism
Extra info for Agent Storm: My Life Inside al Qaeda and the CIA
But almost every group we met voiced concerns about the new cyber vulnerabilities and threats. They emphasized the importance of developing approaches to protecting our infrastructures against cyber threats before they materialize and produce major system damage. (Denning 1999: 75) In the wake of the PCCIP report, President Clinton released Presidential Decision Directive 63, establishing the National Infrastructure Protection Center and calling on the federal government “to serve as a model to the rest of the country for how infrastructure protection is to be attained” (Protecting America’s Critical Infrastructures: PDD 63).
Brenner 2005). S. electrical grid systems and controls. The goal of the intruders seemed to be to map and document the inner workings of the grid, rather than inflict immediate damage. S. authorities investigating the security breach found software tools left behind that could be used to destroy infrastructure components at a later date. S. intelligence official familiar with the Cyberwar: A Real and Growing Threat 9 investigation noted, “If we go to war with them [China], they will try to turn them on” (Gorman 2009).
In addition, the White House website was taken down for three days after it was continually mail bombed (Denning 2008). S. S. websites. S. in Belgrade and the traditionally celebrated May Day and Youth Day in China. com URLs, through DOS attacks and similar measures. Although some of the tools used were sophisticated, they were readily available to both sides on the Internet, and so could not be easily traced back to the Chinese government (Tang 2001). S. sites included pictures of the dead Chinese fighter pilot and messages calling for the downfall of the United States.
Agent Storm: My Life Inside al Qaeda and the CIA by Tim Lister, Morten Storm, Paul Cruickshank