├── Books └── README.md /Books: -------------------------------------------------------------------------------- 1 | AFIO's Guide to the Study of Intelligence -- https://www.afio.com/40_guide.htm 2 | Predictably Irrational, Revised and Expanded Edition: The Hidden Forces That Shape Our Decisions -- Dan Ariely 3 | The Targeter: My Life in the CIA, Hunting Terrorists and Challenging the White House -- Nada Bakos 4 | Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict -- Dan Borges 5 | The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics -- Ben Buchanan 6 | Occidentalism: The West in the Eyes of Its Enemies -- Ian Buruma & Avishai Margalit 7 | The Invisible Gorilla: How Our Intuitions Deceive Us -- Christopher Chabris and Daniel Simons 8 | Algorithms to Live By: The Computer Science of Human Decisions -- Brian Christian and Tom Griffiths 9 | The Cyber Intelligence Handbook: An Authoritative Guide for the C-Suite, IT Staff, and Intelligence Team -- David M. Cooney Jr. and Muireann O'Dunlaing 10 | My CIA: Memories of a Secret Career -- Christopher Costanzo 11 | The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime -- Jon DiMaggio 12 | The Power of Habit: Why We Do What We Do in Life and Business -- Charles Duhigg 13 | Thinking in Bets: Making Smarter Decisions When You Don't Have All the Facts -- Annie Duke 14 | Language vs. Reality: Why Language Is Good for Lawyers and Bad for Scientists -- N. J. Enfield 15 | Peak: Secrets from the New Science of Expertise -- Anders Erixccxson and Robert Pool 16 | The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies -- Jason Fagone 17 | Kingdom of Lies: Unnerving Adventures in the World of Cybercrime -- Kate Fazzini 18 | A Short Course in the Secret War -- Christopher Felix 19 | Under Occupation: A Novel -- Alan Furst (Most Furst novels would work) 20 | Multiple Intelligences: New Horizons in Theory and Practice -- Howard E. Gardner 21 | Better: A Surgeon's Notes on Performance -- Atul Gawande 22 | Anticipating Surprise: Analysis for Strategic Warning -- Cynthia Grabo 23 | Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers -- Andy Greenberg 24 | Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency -- Andy Greenberg 25 | The Psychology of Intelligence Analysis -- Richards J Heuer 26 | Structured Analytic Techniques for Intelligence Analysis -- Richards J Heuer and Randolph H. Pherson 27 | The Billion Dollar Spy: A True Story of Cold War Espionage and Betrayal -- David E. Hoffman 28 | The Failure of Risk Management: Why It's Broken and How to Fix It -- Douglas W. Hubbard 29 | How to Measure Anything: Finding the Value of Intangibles in Business -- Douglas W. Hubbard 30 | How to Measure Anything in Cybersecurity Risk -- Douglas W. Hubbard and Richard Seiersen 31 | Everydata: The Misinformation Hidden in the Little Data You Consume Every Day -- John H. Johnson and Mike Gluck 32 | Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer -- William R. Johnson 33 | The Thinker's Toolkit: 14 Powerful Techniques for Problem Solving -- Morgan D. Jones 34 | The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet -- David Kahn 35 | Thinking, Fast and Slow -- Daniel Kahneman 36 | Dark Territory: The Secret History of Cyber War -- Fred Kaplan 37 | Second Oldest Profession -- Phillip Knightley 38 | Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell -- Phil Lapsley 39 | The Undoing Project: A Friendship That Changed Our Minds -- Michael Lewis 40 | Building an Intelligence-Led Security Program -- Allan Liska 41 | Why?: What Makes Us Curious -- Mario Livio 42 | Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice -- William H. McRaven 43 | The Moscow Rules: The Secret CIA Tactics That Helped America Win the Cold War -- Antonio J. Mendez and Jonna Mendez 44 | The Drunkard's Walk: How Randomness Rules Our Lives -- Leonard Mlodinow 45 | How Doctors Think: Clinical Judgment and the Practice of Medicine -- Kathryn Montgomery 46 | Mindware: Tools for Smart Thinking -- Richard E. Nisbett 47 | Gray Day: My Undercover Mission to Expose America's First Cyber Spy -- Eric O'Neill 48 | This Is How They Tell Me the World Ends: The Cyberweapons Arms Race -- Nicole Perlroth 49 | Active Measures: The Secret History of Disinformation and Political Warfare -- Thomas Rid 50 | Intelligence-Driven Incident Response: Outwitting the Adversary -- Scott J. Roberts and Rebekah Brown 51 | The Intelligence Trap: Why Smart People Make Dumb Mistakes -- David Robson 52 | Orientalism -- Edward Said 53 | Social Network Analysis -- John Scott 54 | Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die -- Eric Siegel 55 | Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics -- Gary Smith 56 | Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage -- Timo Steffens 57 | The Wisdom of Crowds -- James Surowiecki 58 | Black Box Thinking: The Surprising Truth About Success -- Matthew Syed 59 | NeuroLogic: The Brain's Hidden Rationale Behind Our Irrational Behavior -- Eliezer Sternberg 60 | Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets -- Nassim Nicholas Taleb 61 | The Black Swan: The Impact of the Highly Improbable -- Nassim Nicholas Taleb 62 | Nudge: Improving Decisions About Health, Wealth, and Happiness -- Richard H. Thaler and Cass R. Sunstein 63 | Misbehaving: The Making of Behavioral Economics -- Richard Thaler 64 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # IntelAnalystBookClub 2 | A list of books suggested by the security community to aid intelligence analysts learn to think 3 | Intelligence analysts in the cybersecurity field often have a lot of experience with technical indicators, such as 4 | IP addresses, file hashes or domain names. However, there is very little training in how to think like an analyst. 5 | 6 | As cybersecurity becomes more complicated, both in the nature and scope of attacks as well the prominence that the 7 | cybersecurity team plays within an organization, it is imperative for analysts to be able to think clearly, understand 8 | their biases, and effective communicate their position. 9 | 10 | This list of books is designed to help analysts refine their thinking and improve their effectiveness. Many thanks to: 11 | Jerry Bell (@Maliciouslink) 12 | Chris J (@rattis) 13 | Chris Sanders (@chrissanders88) 14 | Mary Mulé (@mstellaluna) 15 | T𝚑𝚎 G𝚞𝚖𝚜𝚑𝚘𝚘 (@thegumshoo) 16 | The Grugq (@thegrugq) 17 | Nori Katagiri 片桐範之 (@norikatagiri1) 18 | For the suggestions, please feel free to add others 19 | --------------------------------------------------------------------------------