^
Начало
Установить закладку
+ Настройки
14 | 16 | 18 | 20 | 22 | 24
Ширина текста:
50% | 60% | 70% | 80% | 90% | 100%
Шрифт:
Цвет текста:
Установить
Цвет фона:
Установить
Сбросить настройки
FOREWORD
PREFACE
1
WATERGATE 2.0
Watergate 1.0
Trump’s Revenge: Erasing Obama’s Presidency
Trump Enters Politics
The Democratic Simmer
The Benghazi Gambit and Email Questions
2
SUSPICIONS OF SOMETHING MORE SINISTER
The Trump Opposition Files
Transmitting the Punch?
Foreign Shenanigans
3
THE SPYMASTER-IN-CHIEF
School of the Second Profession
Putin’s New Nobility
The Illegals Take Manhattan
4
TRUMP’S AGENTS, PUTIN’S ASSETS?
Putin’s Candidate Development Strategy
Play and Manipulate the Subject’s Ego
The Kremlin Crew
The Bayrock Group
The Americans in the Pocket
Trump’ Spy, Putin’s Ally?
Putin’s Strategy to Compromise an American Election
Master Class in “Kompromat”
Professional Assessments of Putin’s Recruitment
5
OPERATION LUCKY-7: THE KREMLIN PLAN TO ELECT A PRESIDENT
How to Organize an Election Theft
Operation Plan LUCKY-7
(Operatzia Paveslo Sem—Операция Повезло Семь)
The Strategic Objectives of the Kremlin for LUCKY-7
Objective: Damage Hillary Clinton & Obama
If Possible, See Her Lose the Election
Objective: Candidate Should Damage NATO Alliance and Push for its Realignment
Objective: Advocate for and/or Repatriate Ethnic Russian Regions
Objective: Keep America Out of the Ukraine in Particular
LUCKY-7: The Information Warfare Management Cell (IWMC)
Phases of Operation LUCKY-7
Launching the CYBER BEARS
6
BATTLES OF THE CYBER BEARS
Putin’s CYBER BEARS
The Advanced Persistent Threats
Zero Day
From Mechanical Hacks to Cyber Theft
First Steps in Cyber Campaigns
APT 28—FANCY BEAR
Russian State Security/Covert External Intelligence (FSB/SVR)
Typosquatters and Watering Holes
APT 29—COZY BEAR
Russian Military Intelligence (GRU)
Attacks of the CYBER BEARS
OPERATION WATERSNAKE
The Criminal Bears, Militia Bears and Others
Putin’s Professional Troll Farm
7
WIKILEAKS: RUSSIA’S INTELLIGENCE
Laundromat
Hillary Derangement Syndrome
8
WHEN CYBER BEARS ATTACK
Cyber Bears! Attack!
The Bears Arrive
Fomenting Civil War among Democrats
The Response to the Hacks
Team Trump Tips its Hand?
The DCCC and ActBlue Hacks
Clinton Campaign Hack
The Intelligence Professionals Weigh In
I Know Noth-Think!
9
CYBERWAR TO DEFEND DEMOCRACY
The Cyberian Candidate
America Under Attack
The Next Attack
Endnotes
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
ALSO BY MALCOLM NANCE
DEFEATING ISIS
Who They Are, How They Fight, What They Believe
Malcolm Nance, Richard Engel
FINAL REPORT OF THE TASK FORCE ON COMBATING TERRORIST AND FOREIGN FIGHTER TRAVEL
Homeland Security Committee, Malcolm Nance
ALSO FROM SKYHORSE PUBLISHING
THE MIND OF A TERRORIST
David Headley, The Mumbai Massacre, and His European Revenge
Kaare Sørensen, Cory Klingsporn
WAR, COUPS, AND TERROR
Pakistan’s Army in Years of Turmoil
Brian Cloughley
THE OSAMA BIN LADEN FILES
Letters and Documents Discovered by SEAL Team Six During Their Raid on bin Laden’s Compound
The Combating Terrorism Centre
TEAMS SECRETS OF THE NAVY SEALs
The Elite Military Force’s Leadership Principles for Business
Robert Needham
THE U.S. NAVY SEAL SURVIVAL HANDBOOK
Learn the Survival Techniques and Strategies of America’s Elite Warriors
Don Mann, Ralph Pezzullo
THE ULTIMATE GUIDE TO U.S. ARMY SURVIVAL SKILLS, TACTICS, AND TECHNIQUES
Jay McCullough
U.S. ARMY WEAPONS SYSTEMS
Department of the Army
U.S. AIR FORCE SURVIVAL HANDBOOK
The Portable and Essential Guide to Staying Alive
United States Air Force, Jay McCullough
U.S. ARMY COUNTERINSURGENCY HANDBOOK
Department of Defense, James F. Amos, David H. Petraeus
U.S. ARMY COUNTERINTELLIGENCE HANDBOOK
Department of the Army
About the Author
Copyright