Review: Silent Steel–The Mysterious Death of the Nuclear Attack Sub USS Scorpion

5 Star, Empire, Sorrows, Hubris, Blowback, Executive (Partisan Failure, Reform), Intelligence (Government/Secret), Power (Pathologies & Utilization), Security (Including Immigration)
Silent Steel
Amazon Page

First-Rate Cover Story Great Human Interest, Service Loyalty, February 6, 2008

Stephen Johnson

EDIT of 9 Feb 09: There is evidently a very strong community of submariners, mostly officers, none of whom were in service at the time the incident happened, most of whom have little intelligence experience and very small libraries, who feel they and only they are qualified to judget between the two books. My two reviews stand. Normal people will find the other book much better in terms of trying to get to a reasonable semblance of the truth. Better yet, skip both books and go right to those I list below.

This a superb individual effort using normally available materials. It fully merits five stars because it can be bought and read simultaneously with Scorpion Down: Sunk by the Soviets, Buried by the Pentagon: The Untold Story of the USS Scorpion, which leverages Freedom of Information demands, direct invesdtigative journalism (HUMINT), and the end of the Cold War which produced a treasure trove of valuable primary materials. If you buy only one book, buy the other one but I find reading books in twos and threes is more interesting.

See for context, other reviews and if attractive, the books also:
The Rules of the Game: Jutland and British Naval Command
Very Special Intelligence: The Story of the Admiralty’s Operational Intelligence Centre 1939-1945
Lost History: Contras, Cocaine, the Press & ‘Project Truth’
The Age of Missing Information (Plume)
Fog Facts: Searching for Truth in the Land of Spin
Legacy of Ashes: The History of the CIA
Manufacturing Consent: The Political Economy of the Mass Media
The Pathology of Power – A Challenge to Human Freedom and Safety
The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic (The American Empire Project)

Vote on Review

Whole Earth Review Archives on Public Intelligence (Historical)

Whole Earth Review

1992

US

Whole Earth RBrandArmy Green

1992

US

Whole Earth RKapor et alWe Need a National Public Network

1992

US

Whole Earth RKleinerThe Co-Evolution of Governance

1992

US

Whole Earth RPetersenWill the Military Miss the Market

1992

US

Whole Earth RStaple & DixonTelegeography: Mapping the New World Order

1992

US

Whole Earth RSteeleE3i: Ethics, Ecology, Evolution, and Intelligence

1992

US

Whole Earth RTibbsIndustrial Ecology: An Environmental Agenda for Industry

1991

US

Whole Earth RBrilliantComputer Conferencing: The Global Connection

1991

US

Whole Earth RClayGenes, Genius, and Genocide

1991

US

Whole Earth RElginConscious Democracy Through Electronic Town Meetings

1991

US

Whole Earth RGarciaAssessing the Impacts of Technology

1991

US

Whole Earth RGodwinThe Electronic Frontier Foundation and Virtual Communities

1991

US

Whole Earth RKarrakerHighways of the Mind

1991

US

Whole Earth RLovins & LovinsWinning the Peace

1991

US

Whole Earth RMarxPrivacy & Technology

1991

US

Whole Earth RMeeksThe Global Commons

1991

US

Whole Earth RRheingoldElectronic Democracy: The Great Equalizer

1991

US

Whole Earth RSchumanReclaiming our Technological Future

1991

US

Whole Earth RWarren & RheingoldAccess to Political Tools: Effective Citizen Action

1991

US

Whole Earth RWhiteEarthtrust: Electronic Mail and Ecological Activism

1991

US

Whole Earth RWhitney-SmithInformation Doesn’t Want

1991

US

Whole Earth RWittigElectronic City Hall

1990

US

Whole Earth RBarlowCrime and Puzzlement: The Advance of the Law on the Electronic Frontier

1990

US

Whole Earth RBrandOutlaws, Musicians, Lovers, and Spies: The Future of Control

1990

US

Whole Earth RDodgeLife Work

1990

JP

Whole Earth RIshiiCross-Cultural Communications & Computer-Supported Cooperative Work

1990

US

Whole Earth RJordon IIIRestoration: Shaping the Land, Transforming the Spirit

1990

JP

Whole Earth RKumonToward Co-Emulation: Japan and the United States in the Information Age

1990

US

Whole Earth RMonschkeHow to Heal the Land

1990

US

Whole Earth RShapardObservations on Cross-Cultural Electronic Networking

1990

US

Whole Earth RVidalFounding Father Knows Best

1989

US

Whole Earth RBermanThe Gesture of Balance

1989

US

Whole Earth RGarfinkleSocial Security Numbers: And Other Telling Information

1989

US

Whole Earth RHaightLiving in the Office

1989

US

Whole Earth RHorvitzThe USENET Underground

1989

US

Whole Earth RJaffeHello, Central: Phone Conferencing Tips

1989

US

Whole Earth RJohnson`The Portable Office

1989

US

Whole Earth RRheingoldEthnobotany: The Search for Vanishing Knowledge

1988

US

Whole Earth RBaker, S.Gossip

1988

US

Whole Earth RBaker, W.Gossip

1988

US

Whole Earth RBrandThe Information Wants to Be Free Strategy

1988

US

Whole Earth RCoateTales from Two Communities: The Well and the Farm

1988

US

Whole Earth RFergusonGossip

1988

US

Whole Earth RFieldsGossip

1988

US

Whole Earth RHardinGossip

1988

US

Whole Earth RHawkinsComputer Parasites & Remedies–A Catalog of First Sightings

1988

US

Whole Earth RKeenGossip

1988

US

Whole Earth RKleinerGossip

1988

US

Whole Earth RLearyGossip

1988

US

Whole Earth RNelsonGossip

1988

US

Whole Earth RNewroeDistance Learning

1988

US

Whole Earth RPertThe Material Basis of Emotions with Inset, Mind as Information

1988

US

Whole Earth RRappaportGossip

1988

US

Whole Earth RThurow & WalshGetting Over the Information Economy

1987

US

Whole Earth RDonaldsonAn Incomplete History of Microcomputing

1987

US

Whole Earth RHensonMEMETICS: The Science of Information Viruses

1987

US

Whole Earth RHorvitzAn Intelligent Guide to Intelligence

1987

US

Whole Earth RKrauseBio-Acoustics: Habitat Ambience & Ecological Balance

1987

US

Whole Earth RRobertsElectronic Cottage on Wheels

1986

US

Whole Earth RFend & GuntherWhat Have You Got to Hide: Iraq Iran Basra Abadan

1986

US

Whole Earth RMinskySociety of Mind

1986

US

Whole Earth RSandersEtiquette for the Age of Transparency

1986

US

Whole Earth RScxhwartz & BrandThe World Information Economy

1986

US

Whole Earth RThompsonA Gaian Politics

1985

US

Whole Earth RBrand, Kelly, KinneyDigital Retouching: The End of Photography as Evidence of Anything

1985

US

Whole Earth RHunterPublic Image

1985

US

Whole Earth RKleinerThe Health Hazards of Computers: A Guide to Worrying Intelligently

1985

US

Whole Earth RManderSix Grave Doubts About Computers

1983

US

Whole Earth RIllichSilence is a Commons: Computers Are Doing to Communication What …

1982

US

Whole Earth RBrandUncommon Courtesy: A School of Compassionate Skills

1982

US

Whole Earth RKayesForce Without Power: A Doctrine of Unarmed Military Service

1982

US

Whole Earth RMeadowsWhole Earth Models & Systems

Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

ThreatBjorgoRoot Causes of Terrorism

2004

US

ThreatKaplanThe Saudi Connection to Terrorism

2004

US

ThreatKnappAl Qaeda and the Mass Media (PSYOP Briefing)

2004

US

ThreatKnappAl Qaeda and the Mass Media (Reference)

2004

US

ThreatKnappDistortion in Islam and Jihad

2004

US

ThreatKnappDiversity in Islam

2006

US

ThreatDalyAl Qaeda Against Saudi Oil

2006

US

ThreatJohnsonBattle of Algiers and Its Lessons

2006

US

ThreatSeagravesGold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

ThreatSeagravesGold Warriors New Chapter Seventeen

2006

US

ThreatSteeleWho Is to Blamce?  The Vice President and Us

2006

US

ThreatSternAl Qaeda Approach to US Muslims

2006

UK

ThreatStoryCrunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

ThreatEllisScenarios for Next Generation Crises in Latin America

2005

US

ThreatGAOGAO Report: US Not Addressing Islamic Fundamentalism

2005

US

ThreatOSSSomalia Piracy Quick Report

2005

US

ThreatOSSReport on Remote Detonation of Improvised Explosive Devices

2005

US

ThreatOSSPRC Trade in Latin America

2005

US

ThreatRay & GrossThe Perfect Storm

2005

US

ThreatSteeleWorksheet for Book Review on Crossing the Rubicon

2005

US

ThreatSteeleMother Nature as Terrorist

2005

US

ThreatSteele9-11: Who’s To Blame?  One Man’s Opinion

2005

US

ThreatThompsonIs the Terrorism Threat Over-Rated?

2004

US

ThreatDalyGlobalization & National Defense (Ecological Economics)

2004

US

ThreatLouisianaPre-Hurricane Katrina Study and Conclusions

2004

US

ThreatPalmerThe Real Axis of Evil: 44 Dictators

2004

US

ThreatPetersEarly Warning of Disease From Pattern Analysis

2004

US

ThreatSeagraveTranscript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

ThreatVlahosAttachment to the Muslim Renovatio Memorandum

2004

US

ThreatVlahosThe Muslim Renovatio and U.S. Strategy

2004

US

ThreatVlahosThe Muslims Are Coming

2004

US

ThreatVlahosInsurgency Within Islam

2003

US

ThreatDanzipCountering Traumatic Attacks

2003

PRC

ThreatOSSPRC Treaty & Trade Penetration of Latin America

2002

US

ThreatEmerson & SteeleAmerican Jihad Map

2002

US

ThreatSteeleACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

ThreatSteeleGeorgetown/AWC: Non-Traditional Threats

1998

US

ThreatSteeleTAKEDOWN: Targets, Tools, & Technocracy

1994

US

ThreatSteele6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

ThreatNGOChanging Face of Global Violence

2005

NGO

ThreatNGOHuman Security Audit

2004

US

ThreatPeltonRobert Young Pelton on Dangerous World

2004

US

ThreatSteeleThree Book Review Relevant to Global War on Terror (GWOT)

2003

US

ThreatCopelandAnalysis of the New Paradigm for Terrorism

2003

US

ThreatManwaringStreet Gangs: New Urban Insurgency

2003

US

ThreatManwaringWar & Conflict: Six Generations

2003

US

ThreatPeltonSummary of Presentation on World’s Most Dangerous Places

2002

US

ThreatBettsThe Next Intelligence Failure: The Limits of Prevention

2002

NL

ThreatJongmanWorld Conflict and Human Rights Map 2001-2002

2002

US

ThreatWheatonTransitions from Authoritarian Rule: A Model

2002

US

ThreatWheatonVirtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

ThreatGodsonGovernments and Gangs

2001

US

ThreatHeidenrichEarly Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

ThreatHeidenrichEarly Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

ThreatTransnational Enemies: Threats Without Names

1998

US

ThreatGlaebusMetaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

ThreatFialkaWar by Other Means: Economic Espionage In (Against) America

1997

US

ThreatSchwartauInformation Warfare: The Weapons of the Information Age

1997

US

ThreatTenneyCyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

ThreatKeuhlSchool of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

ThreatO’MalleyCountering the Business Intelligence Threat

1996

US

ThreatStrassmannU.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

ThreatWinklerElectronic Industrial Espionage: Defining Ground Zero

1994

US

ThreatWhitney-SmithRefugees: Weapon of the Post Cold War World–Counter Offensive: IW