Media »




Sting of the Drone Sting of the Drone
(St. Martin's Press 2014)
In Washington, the Kill Committee gathers in the White House's Situation Room to pick the next targets for the United States drone program. At an airbase just outside Las Vegas, a team of pilots, military personnel and intelligence officers follow through on the committee's orders, finding the men who have been deemed a threat to national security and sentenced to death.
On the other side of the world, in the mountains where the drones hunt their prey, someone has decided to fight back. And not just against the unmanned planes that circle their skies, but against the Americans at home who control them.
Cyber War Cyber War
The next threat to national security and what to do about it

(Harper Collins 2010)
Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. This is the first book about the war of the future -- cyber war -- and a convincing argument that we may already be in peril of losing it.
Your Government Failed You Your Government Failed You (Ecco 2008)
In a 2008 sequel to Against All Enemies, Clarke writes that it is not just Bush and Cheney, the system is broken. He examines the failures in the military, intelligence community, and homeland security and also reviews our shortcomings in energy policy, cyber security, and counter-terrorism. Clarke proposes a series of steps to "break the cycle of national security disasters." Although it focuses on policy, this is not a book for wonks only. Highly readable and filled with fascinating vignettes and personalities, "Your Government Failed You" will make you mad, and maybe give you hope.
Breakpoint Breakpoint (Putnam 2007)
Using the genre of predictive fiction that he has helped to develop, Clarke examines what society will be like in the near future by following advances in genetics, robotics, nano-technology, computer science, and related fields. Using a thriller format, Clarke paints a picture of the political, security, social, moral, economic, and ethical concerns we will all be addressing in five to ten years. Set in 2012 in Boston, Hong Kong, California, the Bahamas, and in cyberspace, Breakpoint is a fast-paced but provocative and thought-provoking novel.
The Forgotten Homeland The Forgotten Homeland (Century Foundation, 2006)
A Task Force Report for the Century Foundation, chaired by Richard A. Clarke and Rand Beers and edited by Steven Simon and Robert Knake. The country's leading homeland security experts analyze the nation's most significant vulnerabilities and propose strategies to reduce them. The report addresses terrorist and other threats, assesses the government's initiatives to date, and offers ideas for strengthening all aspects of our emergency response—including our ability to respond to natural disasters such as Hurricane Katrina.
The Scorpion's Gate The Scorpion's Gate (Putnam 2005)
Sometimes you can tell more truth with fiction and Clarke does in this thriller set in the Middle East. In the near future, the U.S. and Iran are butting heads, China is competing with America for the world's resources, campaign financing corruption in Washington is distorting U.S. priorities, and a Secretary of Defense is secretly planning an unnecessary war. It no longer sounds like fiction. In The Scorpion's Gate Clarke demonstrates how little the U.S. understands the Middle East, and how much it needs to.
Against All Enemies Against All Enemies (Free Press 2004)
The number one best selling book that caused a firestorm of controversy when it was released, Against All Enemies is now widely recognized as the definitive account of what the United States did and did not do in the war on terrorism in the 1990s and early 21st


Securing Cyberspace Through International Norms Securing Cyberspace Through International Norms (PDF)
Cyber crime, cyber espionage, and even cyber war have in recent years become issues of immediate concern to senior government leaders and industry executives, threatening to undermine the great benefits of a globally networked society. Interest has grown among policymakers regarding international norms, or agreed upon rules of behavior, as a method for managing the risk posed by transnational cyber threats. However, to this point, international cybersecurity norm development has been anemic. Securing Cyberspace Through International Norms, prepared by Richard A. Clarke and Good Harbor Security Risk Management, offers a potential path forward. By learning from past norm development efforts, focusing on a limited number of cybersecurity issues, and including private sector stakeholders in global discussions, the international community can make short term progress on strong cybersecurity norms and set the stage for more comprehensive negotiations in the future.
Confronting Cyber Risk in Critical Infrastructure Confronting Cyber Risk in Critical Infrastructure (PDF)
Microsoft commissioned Good Harbor Consulting, chaired by former White House cybersecurity advisor Richard A. Clarke, to research and write this report. The report was prepared by Jacob Olcott, a recognized cybersecurity expert who served in senior professional staff positions in the United States Senate Committee on Commerce, Science, and Transportation and the House of Representatives Committee on Homeland Security, with the support of William Howerton and Emilian Papadopoulos. The team interviewed experts in critical infrastructure security, industrial control systems security, application security, cyber and national security policy, and code analysis to assess their opinions on the state of application security in critical infrastructure environments, its impact on the public and private sectors, and the priority of issues for public discussion. The opinions and conclusions expressed in the report are solely those of the authors or those quoted for the report. The report does not necessarily represent the opinion or position of Microsoft Corporation.
2009 McAfee Virtual Criminology Report Virtual Criminology Report 2009 (PDF)
McAfee commissioned Good Harbor Consulting to research and write the 2009 Virtual Criminology Report. David W. DeCarlo and Stacy Simpson co-authored the report, entitled “Virtually Here: The Age of Cyber Warfare.” The team interviewed 25 experts in international relations, national security and Internet security from around the world to assess their opinions on the definition of cyber war, its impact on the private sector and the priority of issues for public discussion.
Defeating the Jihadists Defeating the Jihadists: A Blueprint for Action (PDF)
A Task Force Report for the Century Foundation, written by a task force assembled and chaired by Richard A. Clarke. It assesses the nation's successes and failures on homeland security and calls for a stronger, more effective strategy for dealing with jihadists, including al Qaeda.
PDF File NATO's Role in Confronting International Terrorism (PDF)
A task force report for the Atlantic Council of The United States. The task force was co-chaired by Richard A. Clarke. This report examines ways in which NATO can act as an organization to play a role in current and future anti-terrorism campaigns.
PDF File Emergency Responders: Drastically Underfunded, Dangerously Unprepared (PDF)
The Council on Foreign Relations, written by a task force that was co-chaired by Richard A. Clarke. This report concludes that the United States is drastically under-funding local emergency responders and remains dangerously unprepared to handle a catastrophic attack on American soil.
PDF File Liquid Natural Gas Facilities in Urban Areas (PDF)
A Security Risk Management Analysis prepared for the Attorney General of Rhode Island. This report examines potential security risks associated with the proposed construction of a liquid natural gas tanker offloading facility in downtown Providence.
PDF File Battery Rock LNG: A Risk Assessment (PDF)
A risk assessment prepared for AES Corporation, one of the world's leading power companies. This report examines risks related to AES Corp.'s proposed creation of a liquid natural gas terminal on Outer Brewster Island In Boston Harbor.

* Adobe Reader is required for viewing and printing the PDF documents. To download the latest version of Adobe Reader, please click here.