No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State


Glenn Greenwald - 2014
    That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.

Information Doesn't Want to Be Free: Laws for the Internet Age


Cory Doctorow - 2014
    Can small artists still thrive in the Internet era? Can giant record labels avoid alienating their audiences? This is a book about the pitfalls and the opportunities that creative industries (and individuals) are confronting today — about how the old models have failed or found new footing, and about what might soon replace them. An essential read for anyone with a stake in the future of the arts, Information Doesn’t Want to Be Free offers a vivid guide to the ways creativity and the Internet interact today, and to what might be coming next.

Writing on the Wall: Social Media - The First 2,000 Years


Tom Standage - 2013
    Indeed, as Tom Standage reveals in his scintillating new book, social media is anything but a new phenomenon.From the papyrus letters that Roman statesmen used to exchange news across the Empire to the advent of hand-printed tracts of the Reformation to the pamphlets that spread propaganda during the American and French revolutions, Standage chronicles the increasingly sophisticated ways people shared information with each other, spontaneously and organically, down the centuries. With the rise of newspapers in the nineteenth century, then radio and television, “mass media” consolidated control of information in the hands of a few moguls. However, the Internet has brought information sharing full circle, and the spreading of news along social networks has reemerged in powerful new ways.A fresh, provocative exploration of social media over two millennia, Writing on the Wall reminds us how modern behavior echoes that of prior centuries-the Catholic Church, for example, faced similar dilemmas in deciding whether or how to respond to Martin Luther's attacks in the early sixteenth century to those that large institutions confront today in responding to public criticism on the Internet. Invoking the likes of Thomas Paine and Vinton Cerf, co-inventor of the Internet, Standage explores themes that have long been debated: the tension between freedom of expression and censorship; whether social media trivializes, coarsens or enhances public discourse; and its role in spurring innovation, enabling self-promotion, and fomenting revolution. As engaging as it is visionary, Writing on the Wall draws on history to cast new light on today's social media and encourages debate and discussion about how we'll communicate in the future.

The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World


Pedro Domingos - 2015
    In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner--the Master Algorithm--and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.

The Evolution of Everything: How New Ideas Emerge


Matt Ridley - 2015
    Drawing on anecdotes from science, economics, history, politics and philosophy, Matt Ridley’s wide-ranging, highly opinionated opus demolishes conventional assumptions that major scientific and social imperatives are dictated by those on high, whether in government, business, academia, or morality. On the contrary, our most important achievements develop from the bottom up. Patterns emerge, trends evolve. Just as skeins of geese form Vs in the sky without meaning to, and termites build mud cathedrals without architects, so brains take shape without brain-makers, learning can happen without teaching and morality changes without a plan.Although we neglect, defy and ignore them, bottom-up trends shape the world. The growth of technology, the sanitation-driven health revolution, the quadrupling of farm yields so that more land can be released for nature—these were largely emergent phenomena, as were the Internet, the mobile phone revolution, and the rise of Asia. Ridley demolishes the arguments for design and effectively makes the case for evolution in the universe, morality, genes, the economy, culture, technology, the mind, personality, population, education, history, government, God, money, and the future.

Lab Rats: How Silicon Valley Made Work Miserable for the Rest of Us


Dan Lyons - 2018
    Why did work become so miserable? Who is responsible? And does any company have a model for doing it right?For two years, Lyons ventured in search of answers. From the innovation-crazed headquarters of the Ford Motor Company in Detroit, to a cult-like "Holocracy" workshop in San Francisco, and to corporate trainers who specialize in ... Legos, Lyons immersed himself in the often half-baked and frequently lucrative world of what passes for management science today. He shows how new tools, workplace practices, and business models championed by tech's empathy-impaired power brokers have shattered the social contract that once existed between companies and their employees. These dystopian beliefs--often masked by pithy slogans like "We're a Team, Not a Family"--have dire consequences: millions of workers who are subject to constant change, dehumanizing technologies--even health risks. A few companies, however, get it right. With Lab Rats, Lyons makes a passionate plea for business leaders to understand this dangerous transformation, showing how profit and happy employees can indeed coexist.

Penetration Testing: A Hands-On Introduction to Hacking


Georgia Weidman - 2014
    This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

Trust Me, I'm Lying: Confessions of a Media Manipulator


Ryan Holiday - 2012
    A malicious online rumor costs a company millions. A political sideshow derails the national news cycle and destroys a candidate. Some product or celebrity zooms from total obscurity to viral sensation. What you don't know is that someone is responsible for all this. Usually, someone like me.I'm a media manipulator. In a world where blogs control and distort the news, my job is to control blogs--as much as any one person can. In today's culture... 1) Blogs like "Gawker," "Buzzfeed" and the "Huffington Post" drive the media agenda. 2) Bloggers are slaves to money, technology, and deadlines. 3) Manipulators wield these levers to shape everything you read, see and watch--online and off.Why am I giving away these secrets? Because I'm tired of a world where blogs take indirect bribes, marketers help write the news, reckless journalists spread lies, and no one is accountable for any of it. I'm pulling back the curtain because I don't want anyone else to get blindsided. I'm going to explain exactly how the media "really" works. What you choose to do with this information is up to you.

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News


Eliot Higgins - 2021
    Soon, the identity of one of the suspects was revealed: he was a Russian spy. This huge investigative coup wasn't pulled off by an intelligence agency or a traditional news outlet. Instead, the scoop came from Bellingcat, the open-source investigative team that is redefining the way we think about news, politics, and the digital future.We Are Bellingcat tells the inspiring story of how a college dropout pioneered a new category of reporting and galvanized citizen journalists-working together from their computer screens around the globe-to crack major cases, at a time when fact-based journalism is under assault from authoritarian forces. Founder Eliot Higgins introduces readers to the tools Bellingcat investigators use, tools available to anyone, from software that helps you pinpoint the location of an image, to an app that can nail down the time that photo was taken. This book digs deep into some of Bellingcat's most important investigations-the downing of flight MH17 over Ukraine, Assad's use of chemical weapons in Syria, the identities of alt-right protestors in Charlottesville-with the drama and gripping detail of a spy novel.

World Without Mind: The Existential Threat of Big Tech


Franklin Foer - 2017
    Over the past few decades there has been a revolution in terms of who controls knowledge and information. This rapid change has imperiled the way we think. Without pausing to consider the cost, the world has rushed to embrace the products and services of four titanic corporations. We shop with Amazon; socialize on Facebook; turn to Apple for entertainment; and rely on Google for information. These firms sell their efficiency and purport to make the world a better place, but what they have done instead is to enable an intoxicating level of daily convenience. As these companies have expanded, marketing themselves as champions of individuality and pluralism, their algorithms have pressed us into conformity and laid waste to privacy. They have produced an unstable and narrow culture of misinformation, and put us on a path to a world without private contemplation, autonomous thought, or solitary introspection--a world without mind. In order to restore our inner lives, we must avoid being coopted by these gigantic companies, and understand the ideas that underpin their success.Elegantly tracing the intellectual history of computer science--from Descartes and the enlightenment to Alan Turing to Stuart Brand and the hippie origins of today's Silicon Valley--Foer exposes the dark underpinnings of our most idealistic dreams for technology. The corporate ambitions of Google, Facebook, Apple, and Amazon, he argues, are trampling longstanding liberal values, especially intellectual property and privacy. This is a nascent stage in the total automation and homogenization of social, political, and intellectual life. By reclaiming our private authority over how we intellectually engage with the world, we have the power to stem the tide.At stake is nothing less than who we are, and what we will become. There have been monopolists in the past but today's corporate giants have far more nefarious aims. They're monopolists who want access to every facet of our identities and influence over every corner of our decision-making. Until now few have grasped the sheer scale of the threat. Foer explains not just the looming existential crisis but the imperative of resistance.

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

This Is Not Propaganda: Adventures in the War Against Reality


Peter Pomerantsev - 2019
    In this surreal atmosphere created to disorient us and undermine our sense of truth, we’ve lost not only our grip on peace and democracy — but our very notion of what those words even mean.Peter Pomerantsev takes us to the front lines of the disinformation age, where he meets Twitter revolutionaries and pop-up populists, “behavioral change” salesmen, Jihadi fanboys, Identitarians, truth cops, and many others. Forty years after his dissident parents were pursued by the KGB, Pomerantsev finds the Kremlin re-emerging as a great propaganda power. His research takes him back to Russia — but the answers he finds there are not what he expected.Blending reportage, family history, and intellectual adventure, This Is Not Propaganda explores how we can reimagine our politics and ourselves when reality seems to be coming apart.

The Hacking of the American Mind: The Science Behind the Corporate Takeover of Our Bodies and Brains


Robert H. Lustig - 2017
    Serotonin is the "contentment" neurotransmitter that tells our brains we don't need any more; yet its deficiency leads to depression. Ideally, both are in optimal supply. Yet dopamine evolved to overwhelm serotonin--because our ancestors were more likely to survive if they were constantly motivated--with the result that constant desire can chemically destroy our ability to feel happiness, while sending us down the slippery slope to addiction. In the last forty years, government legislation and subsidies have promoted ever-available temptation (sugar, drugs, social media, porn) combined with constant stress (work, home, money, Internet), with the end result of an unprecedented epidemic of addiction, anxiety, depression, and chronic disease. And with the advent of neuromarketing, corporate America has successfully imprisoned us in an endless loop of desire and consumption from which there is no obvious escape.With his customary wit and incisiveness, Lustig not only reveals the science that drives these states of mind, he points his finger directly at the corporations that helped create this mess, and the government actors who facilitated it, and he offers solutions we can all use in the pursuit of happiness, even in the face of overwhelming opposition. Always fearless and provocative, Lustig marshals a call to action, with seminal implications for our health, our well-being, and our culture.

Zero Day: The Threat In Cyberspace


Robert O'Harrow Jr. - 2013
    For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.

Zucked: Waking Up to the Facebook Catastrophe


Roger McNamee - 2019
    He had mentored many tech leaders in his illustrious career as an investor, but few things had made him prouder, or been better for his fund's bottom line, than his early service to Mark Zuckerberg. Still a large shareholder in Facebook, he had every good reason to stay on the bright side. Until he simply couldn't. ZUCKED is McNamee's intimate reckoning with the catastrophic failure of the head of one of the world's most powerful companies to face up to the damage he is doing. It's a story that begins with a series of rude awakenings. First there is the author's dawning realization that the platform is being manipulated by some very bad actors. Then there is the even more unsettling realization that Zuckerberg and Sheryl Sandberg are unable or unwilling to share his concerns, polite as they may be to his face."