Book and Film Recommendations

Reviews, Forthcoming, New Releases, Overlooked

FILM: Two Lives (Member Contribution)

George Maas
2012

The film explores the cases of Lebensborn or war children, born from unions between German soldiers and Norwegian women, who were taken away after birth to be raised in Germany. In East Germany, some war children were recruited by the Stasi as agents. Given false identities, they "escaped" to Norway as adults to be reunited with their birth mothers, claiming places of war children and serving as spies. Reportedly there are still such Lebensborn agents in Norway who have not been discovered.

 


 

Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers

Eric O’Neill
William Morrow, Inc., 07 Oct 25

National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect yourself, your family, and your business.

Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, artificial intelligence, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually.

It’s possible to fight back, but it’ll take more than a strong password. Drawing on his years of experience as an FBI spy hunter and national security strategist, Eric O’Neill casts light on these malicious actors’ tactics for stealing personal data and exploiting victims. Armed with this knowledge, O’Neill shares his method—called PAID—that you can use to defend yourself and stop attackers in their tracks:

  • Prepare: Pinpoint your most critical data, identify where it resides and who can access it, and build your defenses around it.
  • Assess: Continuously reassess your security and apply counterintelligence tactics to identify scams and cyberattacks..
  • Investigate: Stay educated andhunt the threat before the threat hunts you.
  • Decide: Using your new aptitude, make smart, rapid decisions under pressure..

Written by a top expert in the field, Spies, Lies, and Cybercrime offers easy-to-follow steps for staving off cyberattacks, securing data, and keeping private information safe in an increasingly digital and dizzying world.


 

Taking Midway: Naval Warfare, Secret Codes, and the Battle that Turned the Tide of World War II

Martin Dugard
Dutton, 20 May 25

1942. Everywhere around the world, the Allies are losing the war. Nowhere is this felt more completely than in the Pacific, where Japanese sea and ground forces claim victory after victory. Singapore falls. Then the Philippines. The vaunted American Navy fights to a draw with the Japanese at the Battle of Coral Sea. America's lone moral victory is Colonel Jimmy Doolittle's bombing raid on Tokyo—though even that is tinged with tragedy as two crew members are shot down and beheaded.

Meanwhile in Honolulu, a brilliant young naval officer is determined to break Japan's top secret codes. Lieutenant Commander Joseph Rochefort is close to cracking the code by April. He is then startled to learn that the Japanese are planning yet another major invasion somewhere in the Pacific. Admiral Isoroku Yamamoto is planning to send four aircraft carriers to complete this task, in a bold attack that will be even larger than the December 1941 attack on Pearl Harbor.

Rochefort's methods are unique, and those in power in the US Navy find his data flawed. Simply, many don't believe him. The best mind in the US Navy believes the next big attack will come at New Guinea or Australia.

To prove himself, Rochefort must not only find the precise location but predict the date. What ensues is the cat-and-mouse adventure that will become the epic fight known as the Battle of Midway. American and Japanese pilots duel in the skies. Japan's Yamamoto will go toe-to-toe with American admirals Chester Nimitz, Jack Fletcher, and Raymond Spruance. The dramatic battle will involve strategy, luck, heartbreak—and will dramatically alter the course of World War II.

 


 

Secret Intelligence Field Manual (Large Print Edition): A comprehensive guide to OSS intelligence gathering methods and covert operations during ... and military strategies during World War I

Amazon Books, 02 Feb 25

The Secret Intelligence Field Manual, published by the Office of Strategic Services (OSS) during World War II, offers a fascinating look into the clandestine world of wartime intelligence. This manual goes beyond basic espionage, providing an in-depth guide to the covert operations and strategies that shaped the OSS’s role in gathering military intelligence, conducting sabotage missions, and aiding resistance movements. 

The OSS, the precursor to the CIA, was instrumental in using unconventional tactics to outsmart enemies during the global conflicts of the 20th century. This book covers a wide range of methods including counterintelligence, psychological warfare, and the use of agents for gathering secret information behind enemy lines. The manual also delves into the training of OSS operatives, their covert fieldwork, and the tools they used to infiltrate enemy territories. 

Espionage tactics such as surveillance, encryption, and the use of spies are explored in detail, showing how OSS agents collected and processed vital information that changed the course of history. The manual also sheds light on the principles of warfare that guided OSS missions, focusing on stealth, deception, and precision. Each chapter reveals the thought process behind key operations, offering readers a rare glimpse into the intelligence community's most secretive practices.

In addition to its insights into espionage, this manual is a valuable historical document for those interested in military history, World War II operations, and the evolution of intelligence agencies. It also explores the OSS's influence on modern intelligence operations, providing context for current intelligence practices.

As a resource for historians, military enthusiasts, and anyone interested in understanding the complexities of global conflicts, this manual provides invaluable knowledge.  Whether you're researching espionage methods, military strategies, or the roles intelligence agencies play in shaping world events, this book is an essential addition to your collection.