Book picks similar to
The Darkening Web: The War for Cyberspace by Alexander Klimburg
non-fiction
politics
technology
nonfiction
Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union
Stephen Budiansky - 2016
The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.
CRACK99: The Takedown of a $100 Million Chinese Software Pirate
David Locke Hall - 2015
Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.
Social Engineering: The Science of Human Hacking
Christopher Hadnagy - 2018
The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States
National Commission on Terrorist Attacks Upon The United States - 2004
In Lower Manhattan, on a field in Pennsylvania, and along the banks of the Potomoc, the United States suffered the single largest loss of life from an enemy attack on its soil.In November 2002 the United States Congress and President George W. Bush established by law the National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission. This independent, bipartisan panel was directed to examine the facts and circumstances surrounding the September 11 attacks, identify lessons learned, and provide recommendations to safeguard against future acts of terrorism. This volume is the authorized edition of the Commission's final report. This volume is the authorized edition of the Commission's final report.
The Looming Tower: Al-Qaeda and the Road to 9/11
Lawrence Wright - 2006
Lawrence Wright's remarkable book is based on five years of research and hundreds of interviews that he conducted in Egypt, Saudi Arabia, Pakistan, Afghanistan, Sudan, England, France, Germany, Spain, and the United States.The Looming Tower achieves an unprecedented level of intimacy and insight by telling the story through the interweaving lives of four men: the two leaders of al-Qaeda, Osama bin Laden and Ayman al-Zawahiri; the FBI's counterterrorism chief, John O'Neill; and the former head of Saudi intelligence, Prince Turki al-Faisal.As these lives unfold, we see revealed: the crosscurrents of modern Islam that helped to radicalize Zawahiri and bin Laden . . . the birth of al-Qaeda and its unsteady development into an organization capable of the American embassy bombings in Kenya and Tanzania and the attack on the USS Cole . . . O'Neill's heroic efforts to track al-Qaeda before 9/11, and his tragic death in the World Trade towers . . . Prince Turki's transformation from bin Laden's ally to his enemy . . . the failures of the FBI, CIA, and NSA to share intelligence that might have prevented the 9/11 attacks.The Looming Tower broadens and deepens our knowledge of these signal events by taking us behind the scenes. Here is Sayyid Qutb, founder of the modern Islamist movement, lonely and despairing as he meets Western culture up close in 1940s America; the privileged childhoods of bin Laden and Zawahiri; family life in the al-Qaeda compounds of Sudan and Afghanistan; O'Neill's high-wire act in balancing his all-consuming career with his equally entangling personal life--he was living with three women, each of them unaware of the others' existence--and the nitty-gritty of turf battles among U.S. intelligence agencies.Brilliantly conceived and written, The Looming Tower draws all elements of the story into a galvanizing narrative that adds immeasurably to our understanding of how we arrived at September 11, 2001. The richness of its new information, and the depth of its perceptions, can help us deal more wisely and effectively with the continuing terrorist threat.
Masters of Deception: The Gang That Ruled Cyberspace
Michelle Slatalla - 1995
"An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
The End of Power: From Boardrooms to Battlefields and Churches to States, Why Being In Charge Isn't What It Used to Be
Moisés Naím - 2013
But power is not merely shifting and dispersing. It is also decaying. Those in power today are more constrained in what they can do with it and more at risk of losing it than ever before. In The End of Power, award-winning columnist and former Foreign Policy editor Moisés Naím illuminates the struggle between once-dominant megaplayers and the new micropowers challenging them in every field of human endeavor. Drawing on provocative, original research, Naím shows how the antiestablishment drive of micropowers can topple tyrants, dislodge monopolies, and open remarkable new opportunities, but it can also lead to chaos and paralysis. Naím deftly covers the seismic changes underway in business, religion, education, within families, and in all matters of war and peace. Examples abound in all walks of life: In 1977, eighty-nine countries were ruled by autocrats while today more than half the world's population lives in democracies. CEO's are more constrained and have shorter tenures than their predecessors. Modern tools of war, cheaper and more accessible, make it possible for groups like Hezbollah to afford their own drones. In the second half of 2010, the top ten hedge funds earned more than the world's largest six banks combined. Those in power retain it by erecting powerful barriers to keep challengers at bay. Today, insurgent forces dismantle those barriers more quickly and easily than ever, only to find that they themselves become vulnerable in the process. Accessible and captivating, Naím offers a revolutionary look at the inevitable end of power—and how it will change your world.
Don't Be Evil: How Big Tech Betrayed Its Founding Principles -- and All of Us
Rana Foroohar - 2019
Today, the utopia they sought to create is looking more dystopian than ever: from digital surveillance and the loss of privacy to the spreading of misinformation and hate speech to predatory algorithms targeting the weak and vulnerable to products that have been engineered to manipulate our desires. How did we get here? How did these once-scrappy and idealistic enterprises become rapacious monopolies with the power to corrupt our elections, co-opt all our data, and control the largest single chunk of corporate wealth—while evading all semblance of regulation and taxes? In Don’t Be Evil, Financial Times global business columnist Rana Foroohar tells the story of how Big Tech lost its soul—and ate our lunch. Through her skilled reporting and unparalleled access—won through nearly thirty years covering business and technology—she shows the true extent to which behemoths like Google, Facebook, Apple, and Amazon are monetizing both our data and our attention, without us seeing a penny of those exorbitant profits. Finally, Foroohar lays out a plan for how we can resist, by creating a framework that fosters innovation while also protecting us from the dark side of digital technology.Praise for
Don’t Be Evil
“At first sight, Don’t Be Evil looks like it’s doing for Google what muckraking journalist Ida Tarbell did for Standard Oil over a century ago. But this whip-smart, highly readable book’s scope turns out to be much broader. Worried about the monopolistic tendencies of big tech? The addictive apps on your iPhone? The role Facebook played in Donald Trump’s election? Foroohar will leave you even more worried, but a lot better informed.”—Niall Ferguson, Milbank Family Senior Fellow at the Hoover Institution, Stanford, and author of The Square and the Tower
Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety
Eric Schlosser - 2013
A groundbreaking account of accidents, near misses, extraordinary heroism, and technological breakthroughs, Command and Control explores the dilemma that has existed since the dawn of the nuclear age: How do you deploy weapons of mass destruction without being destroyed by them? That question has never been resolved—and Schlosser reveals how the combination of human fallibility and technological complexity still poses a grave risk to mankind. While the harms of global warming increasingly dominate the news, the equally dangerous yet more immediate threat of nuclear weapons has been largely forgotten.Written with the vibrancy of a first-rate thriller, Command and Control interweaves the minute-by-minute story of an accident at a nuclear missile silo in rural Arkansas with a historical narrative that spans more than fifty years. It depicts the urgent effort by American scientists, policy makers, and military officers to ensure that nuclear weapons can’t be stolen, sabotaged, used without permission, or detonated inadvertently. Schlosser also looks at the Cold War from a new perspective, offering history from the ground up, telling the stories of bomber pilots, missile commanders, maintenance crews, and other ordinary servicemen who risked their lives to avert a nuclear holocaust. At the heart of the book lies the struggle, amid the rolling hills and small farms of Damascus, Arkansas, to prevent the explosion of a ballistic missile carrying the most powerful nuclear warhead ever built by the United States.Drawing on recently declassified documents and interviews with people who designed and routinely handled nuclear weapons, Command and Control takes readers into a terrifying but fascinating world that, until now, has been largely hidden from view. Through the details of a single accident, Schlosser illustrates how an unlikely event can become unavoidable, how small risks can have terrible consequences, and how the most brilliant minds in the nation can only provide us with an illusion of control. Audacious, gripping, and unforgettable, Command and Control is a tour de force of investigative journalism, an eye-opening look at the dangers of America’s nuclear age.
Conspiracy: Peter Thiel, Hulk Hogan, Gawker, and the Anatomy of Intrigue
Ryan Holiday - 2018
Thiel's sexuality had been known to close friends and family, but he didn't consider himself a public figure, and believed the information was private. This post would be the casus belli for a meticulously plotted conspiracy that would end nearly a decade later with a $140 million dollar judgment against Gawker, its bankruptcy and with Nick Denton, Gawker's CEO and founder, out of a job. Only later would the world learn that Gawker's demise was not incidental--it had been masterminded by Thiel.For years, Thiel had searched endlessly for a solution to what he'd come to call the "Gawker Problem." When an unmarked envelope delivered an illegally recorded sex tape of Hogan with his best friend's wife, Gawker had seen the chance for millions of pageviews and to say the things that others were afraid to say. Thiel saw their publication of the tape as the opportunity he was looking for. He would come to pit Hogan against Gawker in a multi-year proxy war through the Florida legal system, while Gawker remained confidently convinced they would prevail as they had over so many other lawsuit--until it was too late. The verdict would stun the world and so would Peter's ultimate unmasking as the man who had set it all in motion. Why had he done this? How had no one discovered it? What would this mean--for the First Amendment? For privacy? For culture?In Holiday's masterful telling of this nearly unbelievable conspiracy, informed by interviews with all the key players, this case transcends the narrative of how one billionaire took down a media empire or the current state of the free press. It's a study in power, strategy, and one of the most wildly ambitious--and successful--secret plots in recent memory.Some will cheer Gawker's destruction and others will lament it, but after reading these pages--and seeing the access the author was given--no one will deny that there is something ruthless and brilliant about Peter Thiel's shocking attempt to shake up the world.
Who Owns the Future?
Jaron Lanier - 2013
Who Owns the Future? is his visionary reckoning with the most urgent economic and social trend of our age: the poisonous concentration of money and power in our digital networks.Lanier has predicted how technology will transform our humanity for decades, and his insight has never been more urgently needed. He shows how Siren Servers, which exploit big data and the free sharing of information, led our economy into recession, imperiled personal privacy, and hollowed out the middle class. The networks that define our world—including social media, financial institutions, and intelligence agencies—now threaten to destroy it.But there is an alternative. In this provocative, poetic, and deeply humane book, Lanier charts a path toward a brighter future: an information economy that rewards ordinary people for what they do and share on the web.
The Moscow Rules: The Secret CIA Tactics That Helped America Win the Cold War
Antonio J. Méndez - 2019
Soviets kept files on all foreigners, studied their patterns, tapped their phones, and even planted listening devices within the US Embassy. In short, intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthrough that turned the odds in America's favor. As Chief of Disguise and Authentication, Mendez was instrumental in creating and honing a series of tactics that allowed officers to finally get one step ahead of the KGB. These techniques included everything from elaborate, Hollywood-inspired identity swaps, to deception or evasion techniques, to more mundane document forgery. With these new guidelines in place, and with an armory of new gadgets perfected by the Office of Technical Services including miniature cameras, suitcase release body doubles, and wall repelling mechanisms, the CIA managed to gain a foothold in Moscow and pull off some of the greatest intelligence operations in the history of espionage. As America is again confronted by the threat of Russian disinformation, the dramatic inside story of how we defeated our once-and-future enemy is as timely as ever.