SlideShare a Scribd company logo
1 of 24
RICHARD THIEME
THIEMEWORKS
WWW.THIEMEWORKS.COM
rthieme@thiemeworks.com
neuralcowboy@gmail.com
PO Box 170737
Milwaukee WI 53217-8061
真実はフィクションを
通してのみ語れる
監視国家下で生きるという事
" It's no wonder how complicated things
get, what with one thing leading to
another."
... E. B. White
「一つの事が次の事に繋がっている以上、全てがより
複雑化する事に驚きは無い」 …E.B.White
http://www.thiemeworks.com/zero-day-roswell/ …
http://www.washingtonsblog.com/2014/01/american- british- spy-agencies-intentionally-wea kene d-security-many-decades.html?utm_content=buffer d7637&utm_medium=social&utm_source=twitter.c om&utm_campaign=buffer …
"When democracy relies on entertainment to provide
knowledge of its secret affairs, the contradictions of
empire are "normalized to invisibility" thru a blurring of
fictional and real operations."
- Timothy Melley, The Covert Sphere
“民主主義が自己の秘密に関しての周知をエンター
ティンメントに頼るようになったら、帝国の矛盾は
フィクションと実態をぼやかす事で透明化される"
- Timothy Melley, The Covert Sphere
Blue Bookプロジェクト
1952年に米国空軍がプロジェクト Blue Bookを立ち上げる。
ノースウェスト大学の天文学者J.Allen Hynek博士が常任科学者
として採用される.
CIAが参画、調査を行う:
- 空飛ぶ円盤は国家への脅威では無い、しかし目撃
報告は国家への危機.
- 軍関係者は空飛ぶ円盤の目撃に関して正しい観測手法
に関してのトレーニングが必要.
- 空飛ぶ円盤を大衆に向けて否定するプログラムの生成
が必要.
時は進み、Hynekは米国空軍に対して幻滅、
CUFOS(UFO研究所)を立ち上げる。:
「大衆は、”敵”とみなされ、‘防諜’戦略を適用す
べきとされた。個人的な経験から、UFOに関しての目
撃報告者とUFOに関して真剣に情報を求めてた人間は
敵として見なされていると度々感じた」
(UFOs and Government: A Historical Inquiry, p.
243)
Selected Bibliography
参考文献
Mind Games by Richard Thieme (Duncan Long Publishing: 2010)
UFOs and Government: A Historical Inquiry by Michael Swords, Robert Powell, others
including Richard Thieme (Anomalist Books: 2012)
The Covert Sphere: Secrecy, Fiction, and the National Security State by Timothy Melley
(Cornell University Press: 2012)
The Cultural Cold War by Frances Stonor Saunders (New Press: 2001)
See No Evil: The True Story of a Ground Soldier in the CIA's War Against Terrorism by Robert
Baer (Broadway Books: 2003)
Total Cold War: Eisenhower’s Secret Propaganda Battle at Home and Abroad by Kenneth
Osgood (University Press of Kansas: 2006)
The Search for the Manchurian Candidate by John D. Marks (W. W. Norton and Co: 1991)
Intelligence: A Novel of the CIA by Susan Hasler (Thomas Dunne Books: 2010)
Project Halfsheep: Or How the Agency’s Alien Got High by Susan Hasler (Bear Page Press:
2014)
David L. Robb, Operation Hollywood: How the Pentagon Shapes and Censors the Movies (New
York: Prometheus, 2004), 91-93.
Tricia Jenkins, The CIA in Hollywood: How the Agency Shapes Film and Television(University of Texas Press: 2013)
Tricia Jenkins, “Get Smart: A Look At the Current Relationship Between Hollywood and the CIA,” Historical Journal o
and Television, Vol. 29, no. 2 June, 2009, 234.
Carl Bernstein, “The CIA and the Media,” Rolling Stone, 20 Oct. 1977. Accessible at: http://www.carlbernstein.com/mag
Central Intelligence Agency, Task Force Report on Greater CIA Openness, 20 Dec., 1991, 6. Report accessible through Ge
Stephen Kinzer The Brothers: John Foster Dulles, Allen Dulles, and Their Secret World War (Times Books: 2013)
Elizabeth Lloyd Mayer, Extraordinary Knowing (Bantam Books: 2007)
Robert F. Worth, The Spy Novelist Who Knows Too Much (New York Times Magazine: January 30, 2013) - http://www.nyt
Richard Thieme, Islands in the Clickstream (Syngress: 2004)
Richard Thieme, FOAM (coming in 20155
Richard Thieme, A Richard Thieme Reader (coming in 2015)
William B. Scott et al, Space Wars: The First Six Hours of World War III, A War Game Scenario (Forge Books: 2010)

More Related Content

More from CODE BLUE

[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...CODE BLUE
 
[cb22] ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛
[cb22]  ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛[cb22]  ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛
[cb22] ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛CODE BLUE
 

More from CODE BLUE (20)

[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
 
[cb22] ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛
[cb22]  ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛[cb22]  ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛
[cb22] ブロックチェーンにC&Cサーバー情報を隠ぺいした攻撃者との直接対峙により得られたもの by 谷口 剛
 

基調講演:真実を語る唯一の方法はフィクションの中にある:国家安全保障国家これまでの動き by Richard Thieme - CODE BLUE 2015

  • 3. " It's no wonder how complicated things get, what with one thing leading to another." ... E. B. White 「一つの事が次の事に繋がっている以上、全てがより 複雑化する事に驚きは無い」 …E.B.White
  • 4.
  • 5.
  • 6. http://www.thiemeworks.com/zero-day-roswell/ … http://www.washingtonsblog.com/2014/01/american- british- spy-agencies-intentionally-wea kene d-security-many-decades.html?utm_content=buffer d7637&utm_medium=social&utm_source=twitter.c om&utm_campaign=buffer …
  • 7. "When democracy relies on entertainment to provide knowledge of its secret affairs, the contradictions of empire are "normalized to invisibility" thru a blurring of fictional and real operations." - Timothy Melley, The Covert Sphere “民主主義が自己の秘密に関しての周知をエンター ティンメントに頼るようになったら、帝国の矛盾は フィクションと実態をぼやかす事で透明化される" - Timothy Melley, The Covert Sphere
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Blue Bookプロジェクト 1952年に米国空軍がプロジェクト Blue Bookを立ち上げる。 ノースウェスト大学の天文学者J.Allen Hynek博士が常任科学者 として採用される. CIAが参画、調査を行う: - 空飛ぶ円盤は国家への脅威では無い、しかし目撃 報告は国家への危機. - 軍関係者は空飛ぶ円盤の目撃に関して正しい観測手法 に関してのトレーニングが必要. - 空飛ぶ円盤を大衆に向けて否定するプログラムの生成 が必要.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Selected Bibliography 参考文献 Mind Games by Richard Thieme (Duncan Long Publishing: 2010) UFOs and Government: A Historical Inquiry by Michael Swords, Robert Powell, others including Richard Thieme (Anomalist Books: 2012) The Covert Sphere: Secrecy, Fiction, and the National Security State by Timothy Melley (Cornell University Press: 2012) The Cultural Cold War by Frances Stonor Saunders (New Press: 2001) See No Evil: The True Story of a Ground Soldier in the CIA's War Against Terrorism by Robert Baer (Broadway Books: 2003) Total Cold War: Eisenhower’s Secret Propaganda Battle at Home and Abroad by Kenneth Osgood (University Press of Kansas: 2006) The Search for the Manchurian Candidate by John D. Marks (W. W. Norton and Co: 1991) Intelligence: A Novel of the CIA by Susan Hasler (Thomas Dunne Books: 2010) Project Halfsheep: Or How the Agency’s Alien Got High by Susan Hasler (Bear Page Press: 2014) David L. Robb, Operation Hollywood: How the Pentagon Shapes and Censors the Movies (New York: Prometheus, 2004), 91-93.
  • 24. Tricia Jenkins, The CIA in Hollywood: How the Agency Shapes Film and Television(University of Texas Press: 2013) Tricia Jenkins, “Get Smart: A Look At the Current Relationship Between Hollywood and the CIA,” Historical Journal o and Television, Vol. 29, no. 2 June, 2009, 234. Carl Bernstein, “The CIA and the Media,” Rolling Stone, 20 Oct. 1977. Accessible at: http://www.carlbernstein.com/mag Central Intelligence Agency, Task Force Report on Greater CIA Openness, 20 Dec., 1991, 6. Report accessible through Ge Stephen Kinzer The Brothers: John Foster Dulles, Allen Dulles, and Their Secret World War (Times Books: 2013) Elizabeth Lloyd Mayer, Extraordinary Knowing (Bantam Books: 2007) Robert F. Worth, The Spy Novelist Who Knows Too Much (New York Times Magazine: January 30, 2013) - http://www.nyt Richard Thieme, Islands in the Clickstream (Syngress: 2004) Richard Thieme, FOAM (coming in 20155 Richard Thieme, A Richard Thieme Reader (coming in 2015) William B. Scott et al, Space Wars: The First Six Hours of World War III, A War Game Scenario (Forge Books: 2010)