Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.
Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Delta Force. They are the U.S. Army's most elite top-secret strike force. They dominate the modern battlefield, but you won't hear about their heroics on CNN. No headlines can reveal their top-secret missions, and no book has ever taken readers inside—until now. Here, a founding member of Delta Force takes us behind the veil of secrecy and into the action-to reveal the never-before-told story of 1st Special Forces Operational Detachment-D (Delta Force).
Inside Delta Forece
The Story of America's Elite Counterterrorist Unit
He is a master of espionage, trained to take on hijackers, terrorists, hostage takers, and enemy armies. He can deploy by parachute or arrive by commercial aircraft. Survive alone in hostile cities. Speak foreign languages fluently. Strike at enemy targets with stunning swiftness and extraordinary teamwork. He is the ultimate modern warrior: the Delta Force Operator.
In this dramatic behind-the-scenes chronicle, Eric Haney, one of the founding members of Delta Force, takes us inside this legendary counterterrorist unit. Here, for the first time, are details of the grueling selection process—designed to break the strongest of men—that singles out the best of the best: the Delta Force Operator.
With heart-stopping immediacy, Haney tells what it's really like to enter a hostage-held airplane. And from his days in Beirut, Haney tells an unforgettable tale of bodyguards and bombs, of a day-to-day life of madness and beauty, and of how he and a teammate are called on to kill two gunmen targeting U.S. Marines at the Beirut airport. As part of the team sent to rescue American hostages in Tehran, Haney offers a first-person description of that failed mission that is a chilling, compelling account of a bold maneuver undone by chance—and a few fatal mistakes.
From fighting guerrilla warfare in Honduras to rescuing missionaries in Sudan and leading the way onto the island of Grenada, Eric Haney captures the daring and discipline that distinguish the men of Delta Force. Inside Delta Force brings honor to these singular men while it puts us in the middle of action that is sudden, frightening, and nonstop around the world.
From the Hardcover edition.
At 5:58 AM on October 3rd, 2009, Combat Outpost Keating, located in frighteningly vulnerable terrain in Afghanistan just 14 miles from the Pakistani border, was viciously attacked. Though the 53 Americans there prevailed against nearly 400 Taliban fighters, their casualties made it the deadliest fight of the war for the U.S. that year. Four months after the battle, a Pentagon review revealed that there was no reason for the troops at Keating to have been there in the first place.
In THE OUTPOST, Jake Tapper gives us the powerful saga of COP Keating, from its establishment to eventual destruction, introducing us to an unforgettable cast of soldiers and their families, and to a place and war that has remained profoundly distant to most Americans. A runaway bestseller, it makes a savage war real, and American courage manifest.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
Since he was a small boy, Mosab Hassan Yousef has had an inside view of the deadly terrorist group Hamas. The oldest son of Sheikh Hassan Yousef, a founding member of Hamas and its most popular leader, young Mosab assisted his father for years in his political activities while being groomed to assume his legacy, politics, status . . . and power. But everything changed when Mosab turned away from terror and violence, and embraced instead the teachings of another famous Middle East leader. In Son of Hamas, Mosab reveals new information about the world’s most dangerous terrorist organization and unveils the truth about his own role, his agonizing separation from family and homeland, the dangerous decision to make his newfound faith public, and his belief that the Christian mandate to “love your enemies” is the only way to peace in the Middle East.
“A Best Book of 2015”—The New York Times, The Washington Post, People Magazine, San Francisco Chronicle, Kansas City Star, and Kirkus Reviews
In a thrilling dramatic narrative, awarded the 2016 Pulitzer Prize for General Nonfiction, Joby Warrick traces how the strain of militant Islam behind ISIS first arose in a remote Jordanian prison and spread with the unwitting aid of two American presidents.
When the government of Jordan granted amnesty to a group of political prisoners in 1999, it little realized that among them was Abu Musab al-Zarqawi, a terrorist mastermind and soon the architect of an Islamist movement bent on dominating the Middle East. In Black Flags, an unprecedented character-driven account of the rise of ISIS, Pulitzer Prize-winning reporter Joby Warrick shows how the zeal of this one man and the strategic mistakes of Presidents Bush and Obama led to the banner of ISIS being raised over huge swaths of Syria and Iraq.
Zarqawi began by directing terror attacks from a base in northern Iraq, but it was the American invasion in 2003 that catapulted him to the head of a vast insurgency. By falsely identifying him as the link between Saddam and bin Laden, U.S. officials inadvertently spurred like-minded radicals to rally to his cause. Their wave of brutal beheadings and suicide bombings persisted until American and Jordanian intelligence discovered clues that led to a lethal airstrike on Zarqawi’s hideout in 2006.
His movement, however, endured. First calling themselves al-Qaeda in Iraq, then Islamic State of Iraq and Syria, or ISIS, his followers sought refuge in unstable, ungoverned pockets on the Iraq-Syria border. When the Syrian civil war broke out in 2011, and as the U.S. largely stood by, ISIS seized its chance to pursue Zarqawi’s dream of an ultra-conservative Islamic caliphate.
Drawing on unique high-level access to CIA and Jordanian sources, Warrick weaves gripping, moment-by-moment operational details with the perspectives of diplomats and spies, generals and heads of state, many of whom foresaw a menace worse than al Qaeda and tried desperately to stop it. Black Flags is a brilliant and definitive history that reveals the long arc of today’s most dangerous extremist threat.
From the Hardcover edition.
The most momentous change in American warfare over the past decade has taken place away from the battlefields of Afghanistan and Iraq, in the corners of the world where large armies can’t go. The Way of the Knife is the untold story of that shadow war: a campaign that has blurred the lines between soldiers and spies and lowered the bar for waging war across the globe. America has pursued its enemies with killer drones and special operations troops; trained privateers for assassination missions and used them to set up clandestine spying networks; and relied on mercurial dictators, untrustworthy foreign intelligence services, and proxy armies.
This new approach to war has been embraced by Washington as a lower risk, lower cost alternative to the messy wars of occupation and has been championed as a clean and surgical way of conflict. But the knife has created enemies just as it has killed them. It has fomented resentments among allies, fueled instability, and created new weapons unbound by the normal rules of accountability during wartime.
Mark Mazzetti tracks an astonishing cast of characters on the ground in the shadow war, from a CIA officer dropped into the tribal areas to learn the hard way how the spy games in Pakistan are played to the chain-smoking Pentagon official running an off-the-books spy operation, from a Virginia socialite whom the Pentagon hired to gather intelligence about militants in Somalia to a CIA contractor imprisoned in Lahore after going off the leash.
At the heart of the book is the story of two proud and rival entities, the CIA and the American military, elbowing each other for supremacy. Sometimes, as with the raid that killed Osama bin Laden, their efforts have been perfectly coordinated. Other times, including the failed operations disclosed here for the first time, they have not. For better or worse, their struggles will define American national security in the years to come.
Hailed upon its hardcover publication as an instant classic, the critically acclaimed New York Times bestseller 102 Minutes is now available in a revised edition timed to honor the tenth anniversary of the attacks of September 11, 2001.
At 8:46 a.m. that morning, fourteen thouosand people were inside the World Trade Center just starting their workdays, but over the next 102 minutes, each would become part of a drama for the ages. Of the millions of words written about this wrenching day, most were told from the outside looking in. New York Times reporters Jim Dwyer and Kevin Flynn draw on hundreds of interviews with rescuers and survivors, thousands of pages of oral histories, and countless phone, e-mail, and emergency radio transcripts to tell the story of September 11 from the inside looking out.
Dwyer and Flynn have woven an epic and unforgettable account of the struggle, determination, and grace of the ordinary men and women who made 102 minutes count as never before.
102 Minutes is a 2005 National Book Award Finalist for Nonfiction.
A gripping narrative that spans five decades, The Looming Tower explains in unprecedented detail the growth of Islamic fundamentalism, the rise of al-Qaeda, and the intelligence failures that culminated in the attacks on the World Trade Center. Lawrence Wright re-creates firsthand the transformation of Osama bin Laden and Ayman al-Zawahiri from incompetent and idealistic soldiers in Afghanistan to leaders of the most successful terrorist group in history. He follows FBI counterterrorism chief John O’Neill as he uncovers the emerging danger from al-Qaeda in the 1990s and struggles to track this new threat. Packed with new information and a deep historical perspective, The Looming Tower is the definitive history of the long road to September 11.
National Book Award Finalist
Updated and with a New Afterword
Drawn from the ranks of the Navy SEALs, Delta Force, former Blackwater and other private security contractors, the CIA's Special Activities Division and the Joint Special Operations Command ( JSOC), these elite soldiers operate worldwide, with thousands of secret commandos working in more than one hundred countries. Funded through “black budgets,” Special Operations Forces conduct missions in denied areas, engage in targeted killings, snatch and grab individuals and direct drone, AC-130 and cruise missile strikes. While the Bush administration deployed these ghost militias, President Barack Obama has expanded their operations and given them new scope and legitimacy.
Dirty Wars follows the consequences of the declaration that “the world is a battlefield,” as Scahill uncovers the most important foreign policy story of our time. From Afghanistan to Yemen, Somalia and beyond, Scahill reports from the frontlines in this high-stakes investigation and explores the depths of America's global killing machine. He goes beneath the surface of these covert wars, conducted in the shadows, outside the range of the press, without effective congressional oversight or public debate. And, based on unprecedented access, Scahill tells the chilling story of an American citizen marked for assassination by his own government.
As US leaders draw the country deeper into conflicts across the globe, setting the world stage for enormous destabilization and blowback, Americans are not only at greater risk—we are changing as a nation. Scahill unmasks the shadow warriors who prosecute these secret wars and puts a human face on the casualties of unaccountable violence that is now official policy: victims of night raids, secret prisons, cruise missile attacks and drone strikes, and whole classes of people branded as “suspected militants.” Through his brave reporting, Scahill exposes the true nature of the dirty wars the United States government struggles to keep hidden.
Edward Snowden was a 29-year-old computer genius working for the National Security Agency when he shocked the world by exposing the near-universal mass surveillance programs of the United States government. His whistleblowing has shaken the leaders of nations worldwide, and generated a passionate public debate on the dangers of global monitoring and the threat to individual privacy.
In a tour de force of investigative journalism that reads like a spy novel, award-winning Guardian reporter Luke Harding tells Snowden’s astonishing story—from the day he left his glamorous girlfriend in Honolulu carrying a hard drive full of secrets, to the weeks of his secret-spilling in Hong Kong, to his battle for asylum and his exile in Moscow. For the first time, Harding brings together the many sources and strands of the story—touching on everything from concerns about domestic spying to the complicity of the tech sector—while also placing us in the room with Edward Snowden himself. The result is a gripping insider narrative—and a necessary and timely account of what is at stake for all of us in the new digital age.
From the Trade Paperback edition.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
The explosive first-hand account of America's secret history in Afghanistan
To what extent did America’s best intelligence analysts grasp the rising thread of Islamist radicalism? Who tried to stop bin Laden and why did they fail? Comprehensively and for the first time, Pulitzer Prize-winning journalist Steve Coll recounts the history of the covert wars in Afghanistan that fueled Islamic militancy and sowed the seeds of the September 11 attacks. Based on scrupulous research and firsthand accounts by key government, intelligence, and military personnel both foreign and American, Ghost Wars details the secret history of the CIA’s role in Afghanistan (including its covert operations against Soviet troops from 1979 to 1989), the rise of the Taliban, the emergence of bin Laden, and the failed efforts by U.S. forces to find and assassinate bin Laden in Afghanistan.
From the Trade Paperback edition.
As the terrible fruit of Kamal's early life in jihad screams from today's headlines, he courageously puts his life on the line to defend America, the country he now calls home.
Agent Storm takes readers inside the jihadist world like never before, showing the daily life of zealous men set on mass murder, from dodging drones with al Qaeda leaders in the Arabian desert to training in extremist gyms in Britain and performing supply drops in Kenya. The book also provides a tantalizing look at his dangerous life undercover, as Storm traveled the world for missions targeting its most dangerous terrorists, and into the most powerful spy agencies: their tradecraft, rivalries, and late-night carousing, as well as their ruthless use of a beautiful blonde in an ambitious honey trap. Agent Storm is a captivating, utterly unique, real-life espionage tale.
It was only a week before 9/11 that Peter Bergen turned in the manuscript of Holy War, Inc., the story of Osama bin Laden--whom Bergen had once interviewed in a mud hut in Afghanistan--and his declaration of war on America. The book became a New York Times bestseller and the essential portrait of the most formidable terrorist enterprise of our time. Now, in Manhunt, Bergen picks up the thread with this taut yet panoramic account of the pursuit and killing of bin Laden.
Here are riveting new details of bin Laden’s flight after the crushing defeat of the Taliban to Tora Bora, where American forces came startlingly close to capturing him, and of the fugitive leader’s attempts to find a secure hiding place. As the only journalist to gain access to bin Laden’s Abbottabad compound before the Pakistani government demolished it, Bergen paints a vivid picture of bin Laden’s grim, Spartan life in hiding and his struggle to maintain control of al-Qaeda even as American drones systematically picked off his key lieutenants.
Half a world away, CIA analysts haunted by the intelligence failures that led to 9/11 and the WMD fiasco pored over the tiniest of clues before homing in on the man they called "the Kuwaiti"--who led them to a peculiar building with twelve-foot-high walls and security cameras less than a mile from a Pakistani military academy. This was the courier who would unwittingly steer them to bin Laden, now a prisoner of his own making but still plotting to devastate the United States.
Bergen takes us inside the Situation Room, where President Obama considers the COAs (courses of action) presented by his war council and receives conflicting advice from his top advisors before deciding to risk the raid that would change history--and then inside the Joint Special Operations Command, whose "secret warriors," the SEALs, would execute Operation Neptune Spear. From the moment two Black Hawks take off from Afghanistan until bin Laden utters his last words, Manhunt reads like a thriller.
Based on exhaustive research and unprecedented access to White House officials, CIA analysts, Pakistani intelligence, and the military, this is the definitive account of ten years in pursuit of bin Laden and of the twilight of al-Qaeda.
Armored cars, burner phones, top-notch weaponry and top-secret missions--this is the life of today's private military contractor. Like author Simon Chase, many PMCs were once the world's top military operatives, and since retiring from outfits like US Navy SEAL TEAM Six and the UK's Special Boat Service, they have devoted their lives to executing sensitive and hazardous missions overseas.
Working at the request of U.S. and British government entities as well as for private clients, he takes on jobs that require "zero footprint," with no trace of their actions left behind.
Chase delivers first-hand accounts of tracking Bin Laden in Afghanistan and being one of the first responders after the attack on the U.S. Consulate in Benghazi. We see his teams defuse terrorist bombs, guard dignitaries, and protect convoys traveling through perilous territory--and then there are the really big jobs: top-secret "zero footprint" missions that include searching for High Value Targets and setting up arms shipping networks.
The missions in Zero Footprint will shock readers, but so will the personal dangers. Chase and the men he works with operate without government backup or air rescue. If they die serving their country--they remain anonymous. There are no military honors or benefits. Contractors like Simon Chase are the unsung heroes in the war against terrorism, a strong, but largely invisible force--until now.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Learn how to:
* Crack passwords and wireless network keys with brute-forcing and wordlists
* Test web applications for vulnerabilities
* Use the Metasploit Framework to launch exploits and write your own Metasploit modules
* Automate social-engineering attacks
* Bypass antivirus software
* Turn access to one machine into total control of the enterprise in the post exploitation phase
You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework.
With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.
A civilian contractor who had spent years training U.S. military members to resist interrogation should they be captured, Mitchell, aware of the urgent need to prevent impending catastrophic attacks, worked with the CIA to implement "enhanced interrogation techniques"--which included waterboarding.
In Enhanced Interrogation, Mitchell now offers a first-person account of the EIT program, providing a contribution to our historical understanding of one of the most controversial elements of America's ongoing war on terror. Readers will follow him inside the secretive "black sites" and cells of terrorists and terror suspects where he personally applied enhanced interrogation techniques.
Mitchell personally questioned thirteen of the most senior high-value detainees in U.S. custody, including Abu Zubaydah; Abd al-Rahim al-Nashiri, the amir or "commander" of the USS Cole bombing; and Khalid Sheikh Mohammed, the mastermind behind the September 11, 2001, terror attacks--obtaining information that he maintains remains essential to winning the war against al-Qa'ida and informing our strategy to defeat ISIS and all of radical Islam.
From the interrogation program's earliest moments to its darkest hours, Mitchell also lifts the curtain on its immediate effects, the controversy surrounding its methods, and its downfall. He shares his view that EIT, when applied correctly, were useful in drawing detainees to cooperate, and that, when applied incorrectly, they were counter-productive. He also chronicles what it is like to undertake a several-years-long critical mission at the request of the government only to be hounded for nearly a decade afterward by congressional investigations and Justice Department prosecutors.
Gripping in its detail and deeply illuminating, Enhanced Interrogation argues that it is necessary for America to take strong measures to defend itself from its enemies and that the country is less safe now without them than it was before 9/11.
At dawn on March 2, 2002, over two hundred soldiers of the 101st Airborne and 10th Mountain Divisions flew into the mouth of a buzz saw in Afghanistan's Shahikot Valley. Believing the war all but over, U.S. military leaders refused to commit the extra infantry, artillery, and attack helicopters required to fight the war's biggest battle— a missed opportunity to crush hundreds of Al Qaida's fighters and some of its most senior leaders.
Eyewitness Naylor vividly portrays the heroism of the young, untested soldiers, the fanaticism of their ferocious enemy, the mistakes that led to a hellish mountaintop firefight, and how thirteen American commandos embodied "Patton's three principles of war"—audacity, audacity, and audacity—by creeping unseen over frozen mountains into the heart of an enemy stronghold to prevent a U.S. military catastrophe.
A war is being waged against us by radical Islamists, and, as current events demonstrate, they are only getting stronger. Al-Qaeda has morphed into a much more dangerous, menacing threat: ISIS. Lt. General Michael T. Flynn is blunt and urgent. This book aims to inform the American people of the grave danger we face in the war on terror?and will continue to face?until our government takes decisive action against the terrorists that want nothing more than to destroy us and our way of life.
Flynn spent more than thirty three years in Army intelligence, and as Director of the Defense Intelligence Agency worked closely with Generals Stanley McChrystal and David Petraeus, Admiral Mike Mullen, Director of National Intelligence James Clapper, and other policy, defense, intelligence, and war-fighting leaders. From coordinating on-the-ground operations in Iraq, Afghanistan, and elsewhere, to building reliable intelligence networks, to preparing strategic plans for fighting terrorism, Flynn has been a firsthand witness to government screw-ups, smokescreens, and censored information that our leaders don’t want us to know.
The Field of Fight succinctly lays out why we have failed to stop terrorist groups from growing, and what we must do to stop them. The core message is that if you understand your enemies, it’s a lot easier to defeat them?but because our government has concealed the actions of terrorists like Osama bin Laden and groups like ISIS and al Qaeda, and the role of Iran in the rise of radical Islam, we don’t fully understand the enormity of the threat they pose against us.
A call to action that is sensible, informed, and original, The Field of Fight asserts that we must find a way to not only fight better, but to win.
Matthew Alexander, a former criminal investigator and head of a handpicked interrogation team, gives us the first inside look at the U.S. military's attempt at more civilized interrogation techniques -- and their astounding success. The intelligence coup that enabled the June 7, 2006, air strike onZarqawi's rural safe house was the result of several keenly strategized interrogations, none of which involved torture or even "control" tactics.
Matthew and his team decided instead to get to know their opponents. Who were these monsters? Who were they working for? What were they trying to protect? Every day the "'gators" matched wits with a rogues' gallery of suspects brought in by Special Forces ("door kickers"): egomaniacs, bloodthirsty adolescents, opportunistic stereo repairmen, Sunni clerics horrified by the sectarian bloodbath, Al Qaeda fanatics, and good people in the wrong place at the wrong time. With most prisoners, negotiation was possible and psychological manipulation stunningly effective. But Matthew's commitment to cracking the case with these methods sometimes isolated his superiors and put his own career at risk.
This account is an unputdownable thriller -- more of a psychological suspense story than a war memoir. And indeed, the story reaches far past the current conflict in Iraq with a reminder that we don't have to become our enemy to defeat him. Matthew Alexander and his ilk, subtle enough and flexible enough to adapt to the challenges of modern, asymmetrical warfare, have proved to be our best weapons against terrorists all over the world.
Jay Sekulow, one of America’s most influential attorneys, closely examines the rise of the terrorist groups ISIS and Hamas, explains their objectives and capabilities and how, if left undefeated, their existence could unleash a genocide of historic proportions.
Recently, the world has been shaken by gruesome photos and videos that have introduced us to the now infamous terrorist group known as ISIS. The world’s wealthiest and most powerful jihadists, ISIS originated within Al Qaeda with the goal of creating an Islamic state across Iraq and Syria and unrelenting jihad on Christians. Separate from ISIS, the terrorist group Hamas has waged an equally brutal war against Israel. Both groups, if left undefeated, have the potential to unleash a catastrophic genocide.
Rise of ISIS gives a better understanding of the modern face of terror,andprovides an overview of the laws of war and war crimes. These laws differentiate between the guilty and innocent, and explain why the US military and the Israeli Defense Forces are often limited in their defensive measures.
The authors’ firsthand experience, including multiple appearances before the Office of the Prosecutor, International Criminal Court at The Hague, along with direct contact battling jihadists during operation Iraqi Freedom lends insight into this important geopolitical issue.
A must-have for anyone who wants to better understand the conflict that exists in the middle east, this well-researched and fully annotated volume is invaluable in revealing how this new brand of terrorism poses a very real threat to Americans and the world at large. It also serves as a guide to what we as individuals—and as a nation—can do to stop this escalating violence, prevent jihad, and protect Israel and America from this imminent threat.
All four of Robert B. Baer’s previous books were New York Times bestsellers, and it’s no wonder. A recipient of the Career Intelligence Medal, Baer served as a CIA operative for decades, and his career was the model for the acclaimed movie Syriana. Now, Baer draws on his extensive firsthand experience—including a decades-long cat-and-mouse hunt for the greatest assassin of the modern age—to examine the serpentine history of political murder. Offering a tantalizing glimpse at the underbelly of world politics, The Perfect Kill will be avidly read by thriller fans and military history buffs alike.
From the Trade Paperback edition.
From the barbarians of ISIS to the terror tactics of Al-Qaeda and its offshoots, to the impending threat of a nuclear Iran, those motivated by extreme fundamentalist Islamic faith have the power to endanger and kill millions. The conflict with them will not end until we face the truth about those who find their inspiration and justification in the religion itself.
Drawing on quotes from the Koran and the hadith, as well as from leaders of ISIS, Al Qaeda, and the Muslim Brotherhood, Glenn Beck seeks to expose the true origins of Islamic extremism as well as the deadly theological motivations behind these agencies of destruction.
Using the same unique no-holds-barred style from his bestselling books Control and Conform, Glenn Beck offers straight facts and history about the fundamental beliefs that inspire so many to kill.
In Unholy Alliance, Jay Sekulow highlights and defines the looming threat of radical Islam. A movement born in Iran during the Islamic Revolution in 1979, radical Islam has at its heart the goal of complete world domination. As this movement has grown, Iran has entered into alliances with Syria and Russia, leading to a deadly game of geopolitical threats and violence.
Not only will you better understand jihadist terror, but you will also learn about Sharia law—a legal code that removes all personal liberty and is starkly incompatible with the US Constitution. All Muslims are required to follow Sharia—as are all who live in lands controlled by Islam. It is the goal of radical Islam to see Sharia instituted across the globe.
If we are to combat radical Islam’s agenda of domination, we must arm ourselves with knowledge. With carefully researched history, legal-case studies, and in-depth interviews, Unholy Alliance lays out the ideology and strategy of radical Islam, as well as the path we must take to defeat it.
This book covers practical approach on software tools for ethical hacking. Some of the software tools covered are SQL Injection, Password Cracking, port scanning, packet sniffing and etc. Performing ethical hacking requires certain steps and procedures to be followed properly. A good ethical hacker will find information, identify weakness and finally perform some attacks on the target machine. Then the most crucial part would be to produce a good security audit report for the clients to understand their computer network conditions.
This book also explains and demonstrates step by step most of the software security tools for any beginners in the computer security field. Some of the software tools have been selected and utilized in computer security trainings and workshops.
From the author of The Last Magazine, a shocking behind-the-scenes portrait of our military commanders, their high-stake maneuvers, and the politcal firestorm that shook the United States.
In the shadow of the hunt for Bin Laden and the United States’ involvement in the Middle East, General Stanley McChrystal, the commanding general of international and U.S. forces in Afghanistan, was living large. His loyal staff liked to call him a “rock star.” During a spring 2010 trip, journalist Michael Hastings looked on as McChrystal and his staff let off steam, partying and openly bashing the Obama administration. When Hastings’s article appeared in Rolling Stone, it set off a political firestorm: McChrystal was unceremoniously fired.
In The Operators, Hastings picks up where his Rolling Stone coup ended. From patrol missions in the Afghan hinterlands to senior military advisors’ late-night bull sessions to hotel bars where spies and expensive hookers participate in nation-building, Hastings presents a shocking behind-the-scenes portrait of what he fears is an unwinnable war. Written in prose that is at once eye-opening and other times uncannily conversational, readers of No Easy Day will take to Hastings’ unyielding first-hand account of the Afghan War and its cast of players.
What is it like to grow up with a terrorist in your home? Zak Ebrahim was only seven years old when, on November 5th, 1990, his father El-Sayyid Nosair shot and killed the leader of the Jewish Defense League. While in prison, Nosair helped plan the bombing of the World Trade Center in 1993. In one of his infamous video messages, Osama bin Laden urged the world to “Remember El-Sayyid Nosair.”
For Zak Ebrahim, a childhood amongst terrorism was all he knew. After his father’s incarceration, his family moved often, and as the perpetual new kid in class, he faced constant teasing and exclusion. Yet, though his radicalized father and uncles modeled fanatical beliefs, to Ebrahim something never felt right. To the shy, awkward boy, something about the hateful feelings just felt unnatural.
In this book, Ebrahim dispels the myth that terrorism is a foregone conclusion for people trained to hate. Based on his own remarkable journey, he shows that hate is always a choice—but so is tolerance. Though Ebrahim was subjected to a violent, intolerant ideology throughout his childhood, he did not become radicalized. Ebrahim argues that people conditioned to be terrorists are actually well positioned to combat terrorism, because of their ability to bring seemingly incompatible ideologies together in conversation and advocate in the fight for peace. Ebrahim argues that everyone, regardless of their upbringing or circumstances, can learn to tap into their inherent empathy and embrace tolerance over hatred. His original, urgent message is fresh, groundbreaking, and essential to the current discussion about terrorism.
When a “neutral” United States becomes a trading partner for the Allies early in World War I, the Germans implement a secret plan to strike back. A team of saboteurs—including an expert on germ warfare, a Harvard professor, and a brilliant, debonair spymaster—devise a series of “mysterious accidents” using explosives and biological weapons, to bring down vital targets such as ships, factories, livestock, and even captains of industry like J. P. Morgan.
New York Police Inspector Tom Tunney, head of the department’s Bomb Squad, is assigned the difficult mission of stopping them. Assembling a team of loyal operatives, the cunning Irish cop hunts for the conspirators among a population of more than eight million Germans. But the deeper he finds himself in this labyrinth of deception, the more Tunney realizes that the enemy’s plan is far more complex and more dangerous than he suspected.
Full of drama and intensity, illustrated with eight pages of black and-white photos, Dark Invasion is riveting war thriller that chillingly echoes our own time.
Enter a blood-soaked world of South African mercenaries and tribal fighters backed by ruthless financiers. Drop into Baghdad’s Green Zone, strap on body armor, and take a daily high-speed ride with a doomed crew of security contractors who dodge car bombs and snipers just to get their charges to the airport. Share a drink in a chic hotel bar with wealthy owners of private armies who debate the best way to stay alive in war zones.
Licensed to Kill spans four continents and three years, taking us inside the CIA’s dirty wars; the brutal contractor murders in Fallujah and the Alamo-like sieges in Najaf and Al Kut; the Deep South contractor training camps where ex–Special Operations soldiers and even small town cops learn the ropes; the contractor conventions where macho attendees swap bullet-punctuated tales and discuss upcoming gigs; and the grim Central African prison where contractors turned failed mercenaries pay a steep price.
The United States has encouraged the use of the private sector in all facets of the War on Terror, placing contractors outside the bounds of functional legal constraints. With the shocking clarity that can come only from firsthand observation, Licensed to Kill painstakingly deconstructs the most controversial events and introduces the pivotal players. Most disturbingly, it shows that there are indeed thousands of contractors—with hundreds more being produced every month—who’ve been given a license to kill, their services available to the highest bidder.
From the Hardcover edition.
One of the world’s foremost authorities on the subject, Professor Pape has created the first comprehensive database of every suicide terrorist attack in the world from 1980 until today. With striking clarity and precision, Professor Pape uses this unprecedented research to debunk widely held misconceptions about the nature of suicide terrorism and provide a new lens that makes sense of the threat we face.
FACT: Suicide terrorism is not primarily a product of Islamic fundamentalism.
FACT: The world’s leading practitioners of suicide terrorism are the Tamil Tigers in Sri Lanka–a secular, Marxist-Leninist group drawn from Hindu families.
FACT: Ninety-five percent of suicide terrorist attacks occur as part of coherent campaigns organized by large militant organizations with significant public support.
FACT: Every suicide terrorist campaign has had a clear goal that is secular and political: to compel a modern democracy to withdraw military forces from the territory that the terrorists view as their homeland.
FACT: Al-Qaeda fits the above pattern. Although Saudi Arabia is not under American military occupation per se, one major objective of al-Qaeda is the expulsion of U.S. troops from the Persian Gulf region, and as a result there have been repeated attacks by terrorists loyal to Osama bin Laden against American troops in Saudi Arabia and the region as a whole.
FACT: Despite their rhetoric, democracies–including the United States–have routinely made concessions to suicide terrorists. Suicide terrorism is on the rise because terrorists have learned that it’s effective.
In this wide-ranging analysis, Professor Pape offers the essential tools to forecast when some groups are likely to resort to suicide terrorism and when they are not. He also provides the first comprehensive demographic profile of modern suicide terrorist attackers. With data from more than 460 such attackers–including the names of 333–we now know that these individuals are not mainly poor, desperate criminals or uneducated religious fanatics but are often well-educated, middle-class political activists.
More than simply advancing new theory and facts, these pages also answer key questions about the war on terror:
• Are we safer now than we were before September 11?
• Was the invasion of Iraq a good counterterrorist move?
• Is al-Qaeda stronger now than it was before September 11?
Professor Pape answers these questions with analysis grounded in fact, not politics, and recommends concrete ways for today’s states to fight and prevent terrorist attacks. Military options may disrupt terrorist operations in the short term, but a lasting solution to suicide terrorism will require a comprehensive, long-term approach–one that abandons visions of empire and relies on a combined strategy of vigorous homeland security, nation building in troubled states, and greater energy independence.
For both policy makers and the general public, Dying to Win transcends speculation with systematic scholarship, making it one of the most important political studies of recent time.
From the Hardcover edition.
On the night of September 11, 2012, the American diplomatic mission at Benghazi, Libya, came under ferocious attack by a heavily armed group of Islamic terrorists. The prolonged firefight, and the attack hours later on a nearby CIA outpost, resulted in the deaths of four Americans, including the American ambassador to Libya, Christopher Stevens, the Information Officer, Sean Smith, and two former Navy SEALs, Tyrone Woods and Glen Doherty, working for the Central Intelligence Agency.
After the fall of Qaddafi, Benghazi was transformed into a hotbed of fundamentalist fervor and a den of spies for the northern half of the African continent. Moreover, it became the center of gravity for terrorist groups strategically situated in the violent whirlwinds of the Arab Spring. On the eleventh anniversary of the 9/11 attacks against the United States, a group of heavily armed Islamic terrorists had their sights set on the U.S. diplomatic and intelligence presence in the city.
Based on the exclusive cooperation of eyewitnesses and confidential sources within the intelligence, diplomatic, and military communities, Fred Burton and Samuel M. Katz reveal for the first time the terrifying twelve-hour ordeal confronted by Ambassador Christopher Stevens, Sean Smith, his Diplomatic Security (DS) contingent, and the CIA security specialists who raced to rescue them.
More than just the minute-by-minute narrative of a desperate last stand in the midst of an anarchic rebellion, Under Fire is an inspiring testament to the bravery and selflessness of the men and women who put their country first while serving in one of the most dangerous regions in the world.
Because They Hate is a political wake-up call told through a very personal memoir frame. Brigitte warns that the US is threatened by fundamentalist Islamic theology in the same way Lebanon was— radical Islam will stop at nothing short of domination of all non-Muslim countries. Gabriel saw this mission start in Lebanon, and she refuses to stand silently by while it happens here. Gabriel sees in the West a lack of understanding and a blatant ignorance of the ways and thinking of the Middle East. She also points out mistakes the West has made in consistently underestimating the single-mindedness with which fundamentalist Islam has pursued its goals over the past thirty years. Fiercely articulate and passionately committed, Gabriel tells her own story as well as outlines the history, social movements, and religious divisions that have led to this critical historical conflict.
The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills.
Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers.Get acquainted with your hardware, gear, and test platform Learn how attackers penetrate existing security systems Detect malicious activity and build effective defenses Investigate and analyze attacks to inform defense strategy
The Network Security Test Lab is your complete, essential guide.
A true story that few ever believed would come to light, GROWING UP BIN LADEN uncovers startling revelations and hidden secrets carefully guarded by the most wanted terrorist of our lifetime, Osama bin Laden.
"I was not always the wife of Osama bin Laden. Once I was an innocent child dreaming little girl dreams..."
Thus begins this powerful story as Najwa bin Laden, who married her cousin Osama bin Laden at the age of 15 to become his first wife and the mother to eleven of his children, and her son, Omar bin Laden, the fourth-born son of Osama bin Laden. Together, mother and son tell an extraordinarily powerful story of a man hated by so many, yet both loved and feared by his family, with spine-tingling details about the life and times of the man they knew as a husband and father, including: - Osama's disapproval of modern conveniences, including electricity and medicine- His plan to toughen up his sons by taking them into the desert without food or water- Transporting his wives and children to the rough terrain of Sudan, where he claimed to be preparing them for attacks from western powers, commanding them to dig holes, and to sleep in those holes, allowing nothing more than sand and twigs for cover- Omar's horror at the rape and murder of a boy his own age, by members of a jihadist group living among them in the Sudan. - What happened in the bin Laden home in Jeddah, Saudi Arabia, on the morning of September 11, 2001, and Omar's surprise phone call with his mother, who escaped from Afghanistan only two days before the shattering events that killed so many innocent people
Since September 11, 2001, journalists have struggled to uncover carefully guarded information about Osama's private life. Until now, Osama Bin Laden's family members have not cooperated with any writers or journalists. Now, with unprecedented access and insight, Jean Sasson, author of the bestselling Princess: A True Story Behind the Veil in Saudi Arabia, takes us inside the secret world of Osama bin Laden.
In December 2009, a group of the CIA’s top terrorist hunters gathered at a secret base in Khost, Afghanistan, to greet a rising superspy: Humam Khalil al-Balawi, a Jordanian double-agent who infiltrated the upper ranks of al-Qaeda. For months, he had sent shocking revelations from inside the terrorist network and now promised to help the CIA assassinate Osama bin Laden’s top deputy. Instead, as he stepped from his car, he detonated a thirty-pound bomb strapped to his chest, instantly killing seven CIA operatives, the agency’s worst loss of life in decades.
In The Triple Agent, Pulitzer Prize–winning reporter Joby Warrick takes us deep inside the CIA’s secret war against al-Qaeda, a war that pits robotic planes and laser-guided missiles against a cunning enemy intent on unleashing carnage in American cities. Flitting precariously between the two sides was Balawi, a young man with extraordinary gifts who managed to win the confidence of hardened terrorists as well as veteran spymasters. With his breathtaking accounts from inside al-Qaeda’s lair, Balawi appeared poised to become America’s greatest double-agent in half a century—but he was not at all what he seemed. Combining the powerful momentum of Black Hawk Down with the institutional insight of Jane Mayer’s The Dark Side, Warrick takes the readers on a harrowing journey from the slums of Amman to the inner chambers of the White House in an untold true story of miscalculation, deception, and revenge.
From the Hardcover edition.
America is at war. The fight against global jihad has cost 7,000 American lives and almost $2 trillion, and yet, most Americans do not understand what is at stake. The public lacks knowledge and safety because two presidents and their administrations neglected the most basic strategic question: who is the enemy?
Presidents Bush and Obama both named the global jihadi movement—a movement with an intent to destroy the West—“violent extremism.” Their tidy term was an attempt to maintain peace with the Muslim community. But when they failed to appropriately name the enemy, they failed to fully understand Islamic extremism. This failure is why the U.S. has been in Afghanistan for sixteen years with no end in sight.
But this war is eminently winnable if we remove our ideological blinders, accurately name our enemy, and draw up a strategy to defeat the ideas that inspire terrorism. So says Dr. Sebastian Gorka, one of the most experienced and sought-after authorities on counterterrorism.
Dr. Gorka has been one of the intelligence community’s go-to experts on counterterrorism since 9/11. He’s been called to brief Congress and the Marine Corps and was asked to analyze the Patriot’s Day Boston Marathon Bombing for the US government. Dr. Gorka’s report for the trial of Dzhokhar "Jahar" Tsarnaev was widely circulated in counterterrorism circles and the media because it accurately painted a picture, not of a teenager on the cover of Rolling Stone, but of a terrorist.
Dr. Gorka is respected by peers because he understands our enemy is not "terror" or "violent extremism." Our enemy is the global jihadi movement, a modern totalitarian ideology rooted in the doctrines and martial history of Islam whose goals are to build an empire, suppress “false Muslims,” and engage in guerilla warfare against infidels.
Taking his cue from the formerly top-secret analyses that shaped the U.S. response to the communist threat, Dr. Gorka has produced a compelling profile of the jihadi movement—its mind and motivation—and a plan to defeat it.
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before.
It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”
And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid. The current Secretary of Homeland Security suggests keeping a battery-powered radio.
In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?
With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.
Combining statistical analysis with case studies of these specific countries and territories, Erica Chenoweth and Maria J. Stephen detail the factors enabling such campaigns to succeed-and, at times, causing them to fail. They find that nonviolent resistance presents fewer obstacles to moral and physical involvement, information and education, and participator commitment. Higher levels of participation then contribute to enhanced resilience, a greater probability of tactical innovation, increased opportunity for civic disruption (and therefore less incentive for the regime to maintain the status quo), and shifts in loyalty among opponents' erstwhile supporters, including members of the military establishment. They find successful nonviolent resistance movements usher in more durable and internally peaceful democracies, which are less likely to regress into civil war. Presenting a rich, evidentiary argument, this book originally and systematically compares violent and nonviolent outcomes in different historical periods and geographical contexts, debunking the myth that violence occurs because of structural and environmental factors and is necessary to achieve certain political goals. Instead, Chenoweth and Stephan find violent insurgency is rarely justifiable on strategic grounds.
Within days after September 11, 2001, William Langewiesche had secured unique, unrestricted, round-the-clock access to the World Trade Center site. American Ground is a tour of this intense, ephemeral world and those who improvised the recovery effort day by day, and in the process reinvented themselves, discovering unknown strengths and weaknesses. In all of its aspects--emotionalism, impulsiveness, opportunism, territoriality, resourcefulness, and fundamental, cacophonous democracy--Langewiesche reveals the unbuilding to be uniquely American and oddly inspiring, a portrait of resilience and ingenuity in the face of disaster.
The wars in the Middle East have become religious wars in which God is believed to be directly engaged on behalf of one side against the other. The hijackers who attacked America on September 11, 2001, thought they were fighting in the name of God. According to award-winning writer and scholar of religions Reza Aslan, the United States, by infusing the War on Terror with its own religiously polarizing rhetoric, is fighting a similar war—a war that can’t be won.
Beyond Fundamentalism is both an in-depth study of the ideology fueling militants throughout the Muslim world and an exploration of religious violence in Judaism, Christianity, and Islam. At a time when religion and politics increasingly share the same vocabulary and function in the same sphere, Aslan writes that we must strip the conflicts of our world of their religious connotations and address the earthly grievances that always lie at its root.
How do you win a religious war? By refusing to fight in one.
Featuring new content and updated analysis • Originally published as How to Win a Cosmic War
“[A] thoughtful analysis of America’s War on Terror.” —The New Yorker
“Offers a very persuasive argument for the best way to counter jihadism.”—The Washington Post
“[Reza] Aslan dissects a complex subject (terrorism and globalization) and distills it with a mix of narrative writing, personal anecdotes, reportage and historical analysis.”—San Francisco Chronicle
“Aslan is not only a perspicuous, thoughtful interpreter of the Muslim world but also a subtle psychologist of the call to jihad.”—Los Angeles Times
“[A] meaty analysis of the rise of Jihadism . . . dispels common misconceptions of the War on Terror age.”—San Jose Mercury News
“It is Aslan’s great gift to see things clearly, and to say them clearly, and in this important new work he offers us a way forward. He is prescriptive and passionate, and his book will make you think.”—Jon Meacham, Pulitzer Prize–winning author of American Lion
The creation of the first weapon in history whose operators can stalk and kill an enemy on the other side of the globe was far more than clever engineering. As Richard Whittle shows in Predator, it was one of the most profound developments in the history of military and aerospace technology.
Once considered fragile toys, drones were long thought to be of limited utility. The Predator itself was resisted at nearly every turn by the military establishment, but a few iconoclasts refused to see this new technology smothered at birth. The remarkable cast of characters responsible for developing the Predator includes a former Israeli inventor who turned his Los Angeles garage into a drone laboratory, two billionaire brothers marketing a futuristic weapon to help combat Communism, a pair of fighter pilots willing to buck their white-scarf fraternity, a cunning Pentagon operator nicknamed "Snake," and a secretive Air Force organization known as Big Safari. When an Air Force team unleashed the first lethal drone strikes in 2001 for the CIA, the military's view of drones changed nearly overnight.
Based on five years of research and hundreds of interviews, Predator reveals the dramatic inside story of the creation of a revolutionary weapon that forever changed the way we wage war and opened the door to a new age in aviation.
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification.
Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all five sections of the CEH v9 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of new vulnerabilities and threats Master the material well in advance of exam day
By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.