Military & Espionage

  • Inside an Identity Theft Thieves employ sophisticated techniques to steal identities, from phone number spoofing to database hacking. Find out how they do it.

  • Three Advances in Forensics Sniffing, sifting, and sensing new ways to solve—and prevent—crime. Discover what's ahead for forensics.

  • The Cybersecurity Lab Take cybersecurity into your own hands by thwarting a series of increasingly sophisticated cyber attacks. Get started.

Support provided by:

Military & Espionage in the News

Books

  • The Great War and Modern Memory

    by Paul Fussell

  • The Rise and Fall of the Third Reich: A History of Nazi Germany

    by William L. Shirer

  • The Making of the Atomic Bomb

    by Richard Rhodes

  • The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy

    by David E. Hoffman

  • The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States

    by The National Commission on Terrorist Attacks

  • Spycraft: The Secret History of the CIA's Spytechs, from Communism to Al-Qaeda

    by Robert Wallace and H. Keith Melton

  • The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America

    by James Bamford

  • Germs: Biological Weapons and America's Secret War

    by Judith Miller, Stephen Engelberg, and William Broad

  • Spy Satellites and Other Intelligence Technologies That Changed History

    by Thomas Graham Jr. and Keith Hansen

  • Wired for War: The Robotics Revolution and Conflict in the 21st Century

    by P.W. Singer

  • The New Face of War: How War Will Be Fought in the 21st Century

    by Bruce D. Berkowitz

  • My Silent War: The Autobiography of a Spy

    by Kim Philby

DVDS

Shop PBS