Book picks similar to
Cyber Mercenaries by Tim Maurer
cyber
non-fiction
cybersecurity
espionage
Maralinga: The Chilling Expose of Our Secret Nuclear Shame and Betrayal of Our Troops and Country
Frank Walker - 2014
The treachery is chilling. The fallout ongoing.This edition contains a new author note with shocking new material that has come to light as a result of the groundbreaking original publication.Investigative journalist Frank Walker's
Maralinga
is a must-read true story of the abuse of our servicemen, scientists treating the Australian population as lab rats and politicians sacrificing their own people in the pursuit of power.During the Menzies era, with the blessing of the Prime Minister, the British government exploded twelve atomic bombs on Australian soil. RAAF pilots were ordered to fly into nuclear mushroom clouds, soldiers told to walk into radioactive ground zero, sailors retrieved highly contaminated debris - none of them aware of the dangers they faced.But the betrayal didn't end with these servicemen. Secret monitoring stations were set up around the country to measure radiation levels and a clandestine decades-long project stole bones from dead babies to see how much fallout had contaminated their bodies - their grieving parents were never told. This chilling expose drawn from extensive research and interviews with surviving veterans reveals the betrayal of our troops and our country.'An amazing tale ? utterly gripping, it reads like a thriller' - Jon Faine,
ABC Radio Melbourne
'This book will contribute to a much greater awareness and perhaps much more action on this issue' - Fran Kelly,
ABC Radio National
'Walker demonstrates powerfully why, regardless of the context in which the testing took place, the emotional legacy of Maralinga will linger in the Australian psyche, just as do Gallipoli, Bodyline and Singapore. The cost in terms of damage to health, the environment and public trust in government will remain with us for generations to come' - The Australian'Shocking revelations?' - Margaret Throsby, Midday Interview, ABC Classic FM'An extraordinary story ? there are things here that would make your hair stand on end' - Philip Clark,
ABC Radio Canberra
'This book should be on the school syllabus' - Andrew O'Keefe,
Weekend Sunrise
Perilous Times: Free Speech in Wartime: From the Sedition Act of 1798 to the War on Terrorism
Geoffrey R. Stone - 2004
Stone delineates the consistent suppression of free speech in six historical periods from the Sedition Act of 1798 to the Vietnam War, and ends with a coda that examines the state of civil liberties in the Bush era. Full of fresh legal and historical insight, Perilous Times magisterially presents a dramatic cast of characters who influenced the course of history over a two-hundred-year period: from the presidents—Adams, Lincoln, Wilson, Roosevelt, and Nixon—to the Supreme Court justices—Taney, Holmes, Brandeis, Black, and Warren—to the resisters—Clement Vallandingham, Emma Goldman, Fred Korematsu, and David Dellinger. Filled with dozens of rare photographs, posters, and historical illustrations, Perilous Times is resonant in its call for a new approach in our response to grave crises.
The Brothers: John Foster Dulles, Allen Dulles & Their Secret World War
Stephen Kinzer - 2013
In this book, Stephen Kinzer places their extraordinary lives against the background of American culture and history. He uses the framework of biography to ask: Why does the United States behave as it does in the world?The Brothers explores hidden forces that shape the national psyche, from religious piety to Western movies—many of which are about a noble gunman who cleans up a lawless town by killing bad guys. This is how the Dulles brothers saw themselves, and how many Americans still see their country's role in the world.Propelled by a quintessentially American set of fears and delusions, the Dulles brothers launched violent campaigns against foreign leaders they saw as threats to the United States. These campaigns helped push countries from Guatemala to the Congo into long spirals of violence, led the United States into the Vietnam War, and laid the foundation for decades of hostility between the United States and countries from Cuba to Iran.The story of the Dulles brothers is the story of America. It illuminates and helps explain the modern history of the United States and the world. A Kirkus Reviews Best Nonfiction Book of 2013
Public Parts: How Sharing in the Digital Age is Revolutionizing Life, Business, and Society
Jeff Jarvis - 2011
More than 750 million people (and half of all Americans) use Facebook, where we share a billion times a day. The collective voice of Twitter echoes instantly 100 million times daily, from Tahrir Square to the Mall of America, on subjects that range from democratic reform to unfolding natural disasters to celebrity gossip. New tools let us share our photos, videos, purchases, knowledge, friendships, locations, and lives.Yet change brings fear, and many people--nostalgic for a more homogeneous mass culture and provoked by well-meaning advocates for privacy--despair that the internet and how we share there is making us dumber, crasser, distracted, and vulnerable to threats of all kinds. But not Jeff Jarvis.In this shibboleth-destroying book, "Public Parts "argues persuasively and personally that the internet and our new sense of publicness are, in fact, doing the opposite. Jarvis travels back in time to show the amazing parallels of fear and resistance that met the advent of other innovations such as the camera and the printing press. The internet, he argues, will change business, society, and life as profoundly as Gutenberg's invention, shifting power from old institutions to us all.Based on extensive interviews, "Public Parts "introduces us to the men and women building a new industry based on sharing. Some of them have become household names--Facebook's Mark Zuckerberg, Google's Eric Schmidt, and Twitter's Evan Williams. Others may soon be recognized as the industrialists, philosophers, and designers of our future. Jarvis explores the promising ways in which the internet and publicness allow us to collaborate, think, ways--how we manufacture and market, buy and sell, organize and govern, teach and learn. He also examines the necessity as well as the limits of privacy in an effort to understand and thus protect it. This new and open era has already profoundly disrupted economies, industries, laws, ethics, childhood, and many other facets of our daily lives. But the change has just begun. The shape of the future is not assured. The amazing new tools of publicness can be used to good ends and bad. The choices--and the responsibilities--lie with us. Jarvis makes an urgent case that the future of the internet--what one technologist calls "the eighth continent"--requires as much protection as the physical space we share, the air we breathe, and the rights we afford one another. It is a space of the public, for the public, and by the public. It needs protection and respect from all of us. As Secretary of State Hillary Clinton said in the wake of the uprisings in the Middle East, "If people around the world are going to come together every day online and have a safe and productive experience, we need a shared vision to guide us." Jeff Jarvis has that vision and will be that guide.
Geekonomics: The Real Cost of Insecure Software
David Rice - 2007
It explains why low-quality software is continually distributed, why consumers willingly purchase unreliable software, why governments leave the industry alone, and what can be done to improve matters.
Big Data: A Revolution That Will Transform How We Live, Work, and Think
Viktor Mayer-Schönberger - 2013
“Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.www.big-data-book.com
Stalking the Vietcong: Inside Operation Phoenix: A Personal Account
Stuart A. Herrington - 1997
Herrington was an American intelligence advisor assigned to root out the enemy in the Hau Nghia province. His two-year mission to capture or kill Communist agents operating there was made all the more difficult by local officials who were reluctant to cooperate, villagers who were too scared to talk, and VC who would not go down without a fight. Herrington developed an unexpected but intense identification with the villagers in his jurisdiction–and learned the hard way that experiencing war was profoundly different from philosophizing about it in a seminar room.
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
Harpoon: Inside the Covert War Against International Terrorism's Money Masters
Nitsana Darshan-Leitner - 2017
efforts to combat threats like ISIS and drug cartels. ISIS boasted $2.4 billion of revenue in 2015, yet for too long the global war on terror overlooked financial warfare as an offensive strategy. "Harpoon," the creation of Mossad legend Meir Dagan, directed spies, soldiers, and attorneys to disrupt and destroy money pipelines and financial institutions that paid for the bloodshed perpetrated by Hamas, Hezbollah, and other groups. Written by an attorney who worked with Harpoon and a bestselling journalist, Harpoon offers a gripping story of the Israeli-led effort, now joined by the Americans, to choke off the terrorists' oxygen supply, money, via unconventional warfare.
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Helen Nissenbaum - 2009
This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itselfmost people understand that this is crucial to social life but the inappropriate, improper sharing of information.Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contextswhether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
The Future of Violence: Robots and Germs, Hackers and Drones: Confronting A New Age of Threat
Benjamin Wittes - 2014
government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies—from drones to computer networks and biological agents—which could be used to attack states and private citizens alike.In The Future of Violence, law and security experts Benjamin Wittes and Gabriella Blum detail the myriad possibilities, challenges, and enormous risks present in the modern world, and argue that if our national governments can no longer adequately protect us from harm, they will lose their legitimacy. Consequently, governments, companies, and citizens must rethink their security efforts to protect lives and liberty. In this brave new world where many little brothers are as menacing as any Big Brother, safeguarding our liberty and privacy may require strong domestic and international surveillance and regulatory controls. Maintaining security in this world where anyone can attack anyone requires a global perspective, with more multinational forces and greater action to protect (and protect against) weaker states who do not yet have the capability to police their own people. Drawing on political thinkers from Thomas Hobbes to the Founders and beyond, Wittes and Blum show that, despite recent protestations to the contrary, security and liberty are mutually supportive, and that we must embrace one to ensure the other. The Future of Violence is at once an introduction to our emerging world—one in which students can print guns with 3-D printers and scientists’ manipulations of viruses can be recreated and unleashed by ordinary people—and an authoritative blueprint for how government must adapt in order to survive and protect us.
Kill Bin Laden: A Delta Force Commander's Account of the Hunt for the World's Most Wanted Man
Dalton Fury - 2008
Kill Bin Laden: A Delta Force Commander's Account of the Hunt for the World's Most Wanted Man
American Cipher: Bowe Bergdahl and the U.S. Tragedy in Afghanistan
Matt Farwell - 2019
. . . A spectacularly good book about an incredibly painful and important topic."--Sebastian Junger, author of
Tribe
and
War
Private First Class Bowe Bergdahl left his platoon's base in eastern Afghanistan in the early hours of June 30, 2009. Since that day, easy answers to the many questions surrounding his case have proved elusive. American Cipher is the riveting and deeply sourced account of the nearly decade-old Bergdahl quagmire and its place in the larger conflict in Afghanistan. The book tells the parallel stories of a young man's halting coming of age and a nation stalled in an unwinnable war, revealing the fallout that ensued when the two collided. The book's beating heart is Bergdahl himself--an idealistic, misguided soldier onto whom a nation projected the political and emotional complications of service.Based on years of exclusive reporting drawing on dozens of sources throughout the military, government, and Bergdahl's family, friends, and fellow soldiers, American Cipher is at once a meticulous investigation of government dysfunction and political posturing, a blistering commentary on America's presence in Afghanistan, and a hearbreaking story of a na�ve young man who thought he could fix the world and wound up the tool of forces far beyond his understanding.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Deep Fakes and the Infocalypse: What You Urgently Need To Know
Nina Schick - 2020
When combined with powerful voice AI, the results are utterly convincing.So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.