The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries


Andrei Soldatov - 2015
    Perhaps both. On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks. But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad -- such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia -- there is a radical or an opportunist who is using the web to chip away at the power of the state at home. Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.

The Bomber Mafia: A Dream, a Temptation, and the Longest Night of the Second World War


Malcolm Gladwell - 2021
    Most military thinkers in the years leading up to World War II saw the airplane as an afterthought. But a small band of idealistic strategists, the “Bomber Mafia,” asked: What if precision bombing could cripple the enemy and make war far less lethal? In contrast, the bombing of Tokyo on the deadliest night of the war was the brainchild of General Curtis LeMay, whose brutal pragmatism and scorched-earth tactics in Japan cost thousands of civilian lives, but may have spared even more by averting a planned US invasion. In The Bomber Mafia, Gladwell asks, “Was it worth it?” Things might have gone differently had LeMay’s predecessor, General Haywood Hansell, remained in charge. Hansell believed in precision bombing, but when he and Curtis LeMay squared off for a leadership handover in the jungles of Guam, LeMay emerged victorious, leading to the darkest night of World War II. The Bomber Mafia is a riveting tale of persistence, innovation, and the incalculable wages of war.

The Clash of Civilizations and the Remaking of World Order


Samuel P. Huntington - 1996
    The Clash of Civilizations and the Remaking of World Order is one of the most important books to have emerged since the end of the Cold War." --HENRY A. KISSINGERBased on the author's seminal article in Foreign Affairs, Samuel P. Huntington's The Clash of Civilizations and the Remaking of World Order is a provocative and prescient analysis of the state of world politics after the fall of communism. In this incisive work, the renowned political scientist explains how "civilizations" have replaced nations and ideologies as the driving force in global politics today and offers a brilliant analysis of the current climate and future possibilities of our world's volatile political culture."An intellectual tour de force: bold, imaginative, and provocative. A seminal work that will revolutionize our understanding of international affairs." --ZBIGNIEW BRZEZINSKI"The book is studded with insights, flashes of rare brilliance, great learning, and in particular, an ability to see the familiar in a new and provocative way." --MICHAEL ELLIOTT, THE WASHINGTON POST BOOK WORLD"A benchmark for informed speculation on those always fascinating questions: Just where are we in history? What hidden hand is controlling our destiny?...A searching reflection on our global state." --RICHARD BERNSTEIN, THE NEW YORK TIMES"This is what is so stunning about The Clash of Civilizations: It is not just about the future, but may actually help to shape it." --WANG GUNGWU, THE NATIONAL INTEREST

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It


Tsutomu Shimomura - 1996
    Reprint. NYT.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

War by Other Means: Geoeconomics and Statecraft


Robert D. Blackwill - 2016
    Policies governing everything from trade and investment to energy and exchange rates are wielded as tools to win diplomatic allies, punish adversaries, and coerce those in between. Not so in the United States, however. America still too often reaches for the gun over the purse to advance its interests abroad. The result is a playing field sharply tilting against the United States.In a cogent analysis of why the United States is losing ground as a world power and what it can do to reverse the trend, War by Other Means describes the statecraft of geoeconomics: the use of economic instruments to achieve geopolitical goals. Geoeconomics has long been a lever of America’s foreign policy. But factors ranging from U.S. bureaucratic politics to theories separating economics from foreign policy leave America ill prepared for this new era of geoeconomic contest, while rising powers, especially China, are adapting rapidly. The rules-based system Americans set in place after World War II benefited the United States for decades, but now, as the system frays and global competitors take advantage, America is uniquely self-constrained. Its geoeconomic policies are hampered by neglect and resistance, leaving the United States overly reliant on traditional military force.Drawing on immense scholarship and government experience, Robert Blackwill and Jennifer Harris show that if America’s policies are left uncorrected, the price in American blood and treasure will only grow. What geoeconomic warfare requires is a new vision of U.S. statecraft.

Legacy of Ashes: The History of the CIA


Tim Weiner - 2007
    Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.

Masters of Deception: The Gang That Ruled Cyberspace


Michelle Slatalla - 1995
    "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Grunt: The Curious Science of Humans at War


Mary Roach - 2016
    Mary Roach dodges hostile fire with the U.S. Marine Corps Paintball Team as part of a study on hearing loss and survivability in combat. She visits the fashion design studio of U.S. Army Natick Labs and learns why a zipper is a problem for a sniper. She visits a repurposed movie studio where amputee actors help prepare Marine Corps medics for the shock and gore of combat wounds. At Camp Lemmonier, Djibouti, in east Africa, we learn how diarrhea can be a threat to national security. Roach samples caffeinated meat, sniffs an archival sample of a World War II stink bomb, and stays up all night with the crew tending the missiles on the nuclear submarine USS Tennessee. She answers questions not found in any other book on the military: Why is DARPA interested in ducks? How is a wedding gown like a bomb suit? Why are shrimp more dangerous to sailors than sharks? Take a tour of duty with Roach, and you’ll never see our nation’s defenders in the same way again.

Kill Chain: Drones and The Rise of the High-Tech Assassins


Andrew Cockburn - 2015
    Yet few understand how and why this has become our principal way of waging war. Kill Chain uncovers the real and extraordinary story; its origins in long-buried secret programs, the breakthroughs that made drone operations possible, the ways in which the technology works and, despite official claims, does not work. Taking the reader inside the well-guarded world of national security, the book reveals the powerful interests - military, CIA and corporate - that have led the drive to kill individuals by remote control. Most importantly of all, the book describes what has really happened when the theories underpinning the strategy -- and the multi-billion dollar contracts they spawn -- have been put to the test. Drawing on sources deep in the military and intelligence establishments, Andrew Cockburn's Kill Chain unveils the true effects, as demonstrated by bloody experience, of assassination warfare, a revelation that readers will find surprising as well as shocking.

No Good Men Among the Living: America, the Taliban, and the War through Afghan Eyes


Anand Gopal - 2014
    missteps: a Taliban commander, a U.S.-backed warlord, and a housewife trapped in the middle of the fighting. With its intimate accounts of life in small Afghan villages, and harrowing tales of crimes committed by Taliban leaders and American-supported provincial officials alike, No Good Men Among the Living lays bare the workings of America’s longest war and the truth behind its prolonged agony. A thoroughly original exposé of the conflict that is still being fought, it shows just how the American intervention went so desperately wrong.

The Hardware Hacker: Adventures in Making and Breaking Hardware


Andrew Huang - 2017
    In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace


Ejovi Nuwere - 2002
    Raised by his grandmother, his extended family included two uncles who served as role models: one a career criminal, the other a college student with a PC he loaned to his nephew. By the time he was 13, Ejovi had become a computer expert -- a gifted hacker with a talent that propelled him to the top of a dangerous underground world in which he ranked as one of its most elite practitioners. And at 21, he has become a top security specialist for one of the world's largest financial firms.Interweaving details of his life growing up on the bullet-ridden streets of Bed-Sty with fascinating hacker lore and a glimpse of the inner workings of sensitive corporate computer systems, Hacker Cracker is a Horatio Alger tale for our times: a thrilling, frightening, and ultimately uplifting story of survival and success.

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."