Hackers: Heroes of the Computer Revolution


Steven Levy - 1984
    That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.

The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower


Michael Pillsbury - 2014
    government's leading China experts reveals the hidden strategy fueling that country's rise – and how Americans have been seduced into helping China overtake us as the world's leading superpower.For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China's rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?Based on interviews with Chinese defectors and newly declassified, previously undisclosed national security documents, The Hundred-Year Marathon reveals China's secret strategy to supplant the United States as the world's dominant power, and to do so by 2049, the one-hundredth anniversary of the founding of the People's Republic. Michael Pillsbury, a fluent Mandarin speaker who has served in senior national security positions in the U.S. government since the days of Richard Nixon and Henry Kissinger, draws on his decades of contact with the "hawks" in China's military and intelligence agencies and translates their documents, speeches, and books to show how the teachings of traditional Chinese statecraft underpin their actions. He offers an inside look at how the Chinese really view America and its leaders – as barbarians who will be the architects of their own demise.Pillsbury also explains how the U.S. government has helped – sometimes unwittingly and sometimes deliberately – to make this "China Dream" come true, and he calls for the United States to implement a new, more competitive strategy toward China as it really is, and not as we might wish it to be. The Hundred-Year Marathon is a wake-up call as we face the greatest national security challenge of the twenty-first century.

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous


Gabriella Coleman - 2014
    She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”

iWar: War and Peace in the Information Age


Bill Gertz - 2017
    Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Legacy of Ashes: The History of the CIA


Tim Weiner - 2007
    Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State


Glenn Greenwald - 2014
    That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.

The Scientist and the Spy: A True Story of China, the FBI, and Industrial Espionage


Mara Hvistendahl - 2020
    government for trying to steal trade secrets, by a finalist for the Pulitzer Prize in nonfiction.In September 2011, sheriff's deputies in Iowa encountered three ethnic Chinese men near a field where a farmer was growing corn seed under contract with Monsanto. What began as a simple trespassing inquiry mushroomed into a two-year FBI operation in which investigators bugged the men's rental cars, used a warrant intended for foreign terrorists and spies, and flew surveillance planes over corn country--all in the name of protecting trade secrets of corporate giants Monsanto and DuPont Pioneer. In The Scientist and the Spy, Hvistendahl gives a gripping account of this unusually far-reaching investigation, which pitted a veteran FBI special agent against Florida resident Robert Mo, who after his academic career foundered took a questionable job with the Chinese agricultural company DBN--and became a pawn in a global rivalry.Industrial espionage by Chinese companies lies beneath the United States' recent trade war with China, and it is one of the top counterintelligence targets of the FBI. But a decade of efforts to stem the problem have been largely ineffective. Through previously unreleased FBI files and her reporting from across the United States and China, Hvistendahl describes a long history of shoddy counterintelligence on China, much of it tinged with racism, and questions the role that corporate influence plays in trade secrets theft cases brought by the U.S. government. The Scientist and the Spy is both an important exploration of the issues at stake and a compelling, involving read.

Facts and Fears: Hard Truths from a Life in Intelligence


James R. Clapper - 2018
    In Facts and Fears Clapper traces his career through his rise in ranks of the military, the history of several decades of national intelligence operations, the growing threat of cyberattacks, his relationships with presidents and Congress, and the truth about Russia's role in the presidential election. He describes, in the wake of Snowden and WikiLeaks, his efforts to make intelligence more transparent and to push back against the suspicion that Americans' private lives are subject to surveillance. Clapper considers such difficult questions as, is intelligence ethical? Is it moral to use human sources to learn secrets, to intercept communications, to take pictures of closed societies from orbit? What are the limits of what we should be allowed to do? What protections should we give to the private citizens of the world, not to mention our fellow Americans? Is there a time that intelligence officers can lose credibility as unbiased reporters of hard truths by asserting themselves into policy decisions?

The Dark Net: Inside the Digital Underworld


Jamie Bartlett - 2014
    A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.

The Sword and the Shield: The Mitrokhin Archive & the Secret History of the KGB


Christopher Andrew - 1985
    Vasili Mitrokhin, a secret dissident who worked in the KGB archive, smuggled out copies of its most highly classified files every day for twelve years. In 1992, a U.S. ally succeeded in exfiltrating the KGB officer and his entire archive out of Moscow. The archive covers the entire period from the Bolshevik Revolution to the 1980s and includes revelations concerning almost every country in the world. But the KGB's main target, of course, was the United States. Though there is top-secret material on almost every country in the world, the United States is at the top of the list. As well as containing many fascinating revelations, this is a major contribution to the secret history of the twentieth century. Among the topics and revelations explored are: The KGB's covert operations in the United States and throughout the West, some of which remain dangerous today. KGB files on Oswald and the JFK assassination that Boris Yeltsin almost certainly has no intention of showing President Clinton. The KGB's attempts to discredit civil rights leader in the 1960s, including its infiltration of the inner circle of a key leader. The KGB's use of radio intercept posts in New York and Washington, D.C., in the 1970s to intercept high-level U.S. government communications. The KGB's attempts to steal technological secrets from major U.S. aerospace and technology corporations. KGB covert operations against former President Ronald Reagan, which began five years before he became president. KGB spies who successfully posed as U.S. citizens under a series of ingenious disguises, including several who attained access to the upper echelons of New York society.

Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda


Robert Wallace - 2008
    It is a world where the intrigue of reality exceeds that of fiction. What is an invisible photo used for? What does it take to build a quiet helicopter? How does one embed a listening device in a cat? If these sound like challenges for Q, James Bondas fictional gadget-master, think again. Theyare all real-life devices created by the CIAas Office of Technical Serviceaan ultrasecretive department that combines the marvels of state-of-the-art technology with the time-proven traditions of classic espionage. And now, in the first book ever written about this office, the former director of OTS teams up with an internationally renowned intelligence historian to take readers into the laboratory of espionage. Spycraft tells amazing life and death stories about this littleknown group, much of it never before revealed. Against the backdrop of some of Americaas most critical periods in recent historyaincluding the Cold War, the Cuban Missile Crisis, and the war on terrorathe authors show the real technical and human story of how the CIA carries out its missions.

The Secret Sentry: The Untold History of the National Security Agency


Matthew M. Aid - 2009
    In February 2006, while researching this book, Matthew Aid uncovered a massive and secret document reclassification program—a revelation that made the front page of the New York Times. This was only one of the discoveries Aid has made during two decades of research in formerly top-secret documents. In The Secret Sentry, Aid provides the first-ever full history of America's largest security apparatus, the National Security Agency. This comprehensive account traces the growth of the agency from 1945 to the present through critical moments in its history, from the cold war up to its ongoing involvement in Afghanistan and Iraq. Aid explores the agency's involvement in the Iraqi weapons intelligence disaster, where evidence that NSA officials called "ambiguous" was used as proof of Iraqi WMD capacity, and details the intense debate within the NSA over its unprecedented role, pressed by the Bush-Cheney administration, in spying on U.S. citizens. Today, the NSA has become the most important source of intelligence for the U.S. government, providing 60 percent of the president's daily intelligence briefing. While James Bamford's New York Times bestseller The Shadow Factory covered the NSA since 9/11, The Secret Sentry contains new information about every period since World War II . It provides a shadow history of global affairs, from the creation of I srael to the War on Terror.

Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy


George Gilder - 2018
    Gilder says or writes is ever delivered at anything less than the fullest philosophical decibel... Mr. Gilder sounds less like a tech guru than a poet, and his words tumble out in a romantic cascade." “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.” — Peter Thiel, founder of PayPal and Palantir Technologies and author of Zero to One: Notes on Startups, or How to Build the Future The Age of Google, built on big data and machine intelligence, has been an awesome era. But it’s coming to an end. In Life after Google, George Gilder—the peerless visionary of technology and culture—explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns. Google’s astonishing ability to “search and sort” attracts the entire world to its search engine and countless other goodies—videos, maps, email, calendars….And everything it offers is free, or so it seems. Instead of paying directly, users submit to advertising. The system of “aggregate and advertise” works—for a while—if you control an empire of data centers, but a market without prices strangles entrepreneurship and turns the Internet into a wasteland of ads. The crisis is not just economic. Even as advances in artificial intelligence induce delusions of omnipotence and transcendence, Silicon Valley has pretty much given up on security. The Internet firewalls supposedly protecting all those passwords and personal information have proved hopelessly permeable. The crisis cannot be solved within the current computer and network architecture. The future lies with the “cryptocosm”—the new architecture of the blockchain and its derivatives. Enabling cryptocurrencies such as bitcoin and ether, NEO and Hashgraph, it will provide the Internet a secure global payments system, ending the aggregate-and-advertise Age of Google. Silicon Valley, long dominated by a few giants, faces a “great unbundling,” which will disperse computer power and commerce and transform the economy and the Internet. Life after Google is almost here.   For fans of "Wealth and Poverty," "Knowledge and Power," and "The Scandal of Money."