WikiLeaks: Inside Julian Assange's War on Secrecy


David Leigh - 2011
    A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its founder Julian Assange, and the ethical, legal, and political controversies it has both uncovered and provoked.

The Scientist and the Spy: A True Story of China, the FBI, and Industrial Espionage


Mara Hvistendahl - 2020
    government for trying to steal trade secrets, by a finalist for the Pulitzer Prize in nonfiction.In September 2011, sheriff's deputies in Iowa encountered three ethnic Chinese men near a field where a farmer was growing corn seed under contract with Monsanto. What began as a simple trespassing inquiry mushroomed into a two-year FBI operation in which investigators bugged the men's rental cars, used a warrant intended for foreign terrorists and spies, and flew surveillance planes over corn country--all in the name of protecting trade secrets of corporate giants Monsanto and DuPont Pioneer. In The Scientist and the Spy, Hvistendahl gives a gripping account of this unusually far-reaching investigation, which pitted a veteran FBI special agent against Florida resident Robert Mo, who after his academic career foundered took a questionable job with the Chinese agricultural company DBN--and became a pawn in a global rivalry.Industrial espionage by Chinese companies lies beneath the United States' recent trade war with China, and it is one of the top counterintelligence targets of the FBI. But a decade of efforts to stem the problem have been largely ineffective. Through previously unreleased FBI files and her reporting from across the United States and China, Hvistendahl describes a long history of shoddy counterintelligence on China, much of it tinged with racism, and questions the role that corporate influence plays in trade secrets theft cases brought by the U.S. government. The Scientist and the Spy is both an important exploration of the issues at stake and a compelling, involving read.

Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age


Michael A. Hiltzik - 1999
    And they did it without fanfare or recognition from their employer. Hiltzik's Dealers of Lightning provides a fascinating look at technohistory that sets the record straight. In Dealers of Lightning, Hiltzik describes the forces and faces behind the revolution that the Xerox PARC team single-handedly spawned. The Xerox PARC group was composed solely of top technical minds. The decision was made at Xerox headquarters to give the team complete freedom from deadlines and directives, in hopes of fostering a true creative environment. It worked — perhaps too well. The team responded with a steady output of amazing technology, including the first version of the Internet, the first personal computer, user-friendly word-processing programs, and pop-up menus. Xerox, far from ready for the explosion of innovation, failed to utilize the technology dreamed up by the group. Out of all the dazzling inventions born at Xerox PARC, only a handful were developed and marketed by Xerox. However, one of these inventions, the laser printer, proved successful enough to earn billions for the company, therefore justifying its investment in the research center. Most oftheteam's creations would go on to be developed and perfected by other companies, such as IBM, Apple, and Microsoft. Drawing from interviews with the engineers, executives, and scientists involved in the Xerox PARC, Dealers of Lightning chronicles an amazing era of egos, ideas, and inventions at the dawn of the computer age.

The Fourth Turning: What the Cycles of History Tell Us about America's Next Rendezvous with Destiny


William Strauss - 1996
    With blazing originality, The Fourth Turning illuminates the past, explains the present, and reimagines the future. Most remarkably, it offers an utterly persuasive prophecy about how America's past will predict its future.Strauss and Howe base this vision on a provocative theory of American history. The authors look back five hundred years and uncover a distinct pattern: Modern history moves in cycles, each one lasting about the length of a long human life, each composed of four eras--or turnings--that last about twenty years and that always arrive in the same order. In The Fourth Turning, the authors illustrate these cycles using a brilliant analysis of the post-World War II period.First comes a High, a period of confident expansion as a new order takes root after the old has been swept away. Next comes an Awakening, a time of spiritual exploration and rebellion against the now-established order. Then comes an Unraveling, an increasingly troubled era in which individualism triumphs over crumbling institutions. Last comes a Crisis--the Fourth Turning--when society passes through a great and perilous gate in history. Together, the four turnings comprise history's seasonal rhythm of growth, maturation, entropy, and rebirth.The Fourth Turning offers bold predictions about how all of us can prepare, individually and collectively, for America's next rendezvous with destiny.

The Information: A History, a Theory, a Flood


James Gleick - 2011
    The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born. From the invention of scripts and alphabets to the long-misunderstood talking drums of Africa, Gleick tells the story of information technologies that changed the very nature of human consciousness. He provides portraits of the key figures contributing to the inexorable development of our modern understanding of information: Charles Babbage, the idiosyncratic inventor of the first great mechanical computer; Ada Byron, the brilliant and doomed daughter of the poet, who became the first true programmer; pivotal figures like Samuel Morse and Alan Turing; and Claude Shannon, the creator of information theory itself. And then the information age arrives. Citizens of this world become experts willy-nilly: aficionados of bits and bytes. And we sometimes feel we are drowning, swept by a deluge of signs and signals, news and images, blogs and tweets. The Information is the story of how we got here and where we are heading.

Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth


Rachel Maddow - 2019
    That same year, a trove of Michael Jackson memorabilia—including his iconic crystal-encrusted white glove—was sold at auction for over $1 million to a guy who was, officially, just the lowly forestry minister of the tiny nation of Equatorial Guinea. And in 2014, Ukrainian revolutionaries raided the palace of their ousted president and found a zoo of peacocks, gilded toilets, and a floating restaurant modeled after a Spanish galleon. Unlikely as it might seem, there is a thread connecting these events, and Rachel Maddow follows it to its crooked source: the unimaginably lucrative and equally corrupting oil and gas industry. With her trademark black humor, Maddow takes us on a switchback journey around the globe, revealing the greed and incompetence of Big Oil and Gas along the way, and drawing a surprising conclusion about why the Russian government hacked the 2016 U.S. election. She deftly shows how Russia’s rich reserves of crude have, paradoxically, stunted its growth, forcing Putin to maintain his power by spreading Russia’s rot into its rivals, its neighbors, the West’s most important alliances, and the United States. Chevron, BP, and a host of other industry players get their star turn, most notably ExxonMobil and the deceptively well-behaved Rex Tillerson. The oil and gas industry has weakened democracies in developed and developing countries, fouled oceans and rivers, and propped up authoritarian thieves and killers. But being outraged at it is, according to Maddow, “like being indignant when a lion takes down and eats a gazelle. You can’t really blame the lion. It’s in her nature.” Blowout is a call to contain the lion: to stop subsidizing the wealthiest businesses on earth, to fight for transparency, and to check the influence of the world’s most destructive industry and its enablers. The stakes have never been higher. As Maddow writes, “Democracy either wins this one or disappears.”

The Anatomy of Motive: The FBI's Legendary Mindhunter Explores the Key to Understanding and Catching Violent Criminals


John E. Douglas - 1999
    With the brilliant insight he brought to his renowned work inside the FBI's elite serial-crime unit, John Douglas pieces together motives behind violent sociopathic behavior. He not only takes us into the darkest recesses of the minds of arsonists, hijackers, bombers, poisoners, assassins, serial killers, and mass murderers, but also the seemingly ordinary people who suddenly kill their families or go on a rampage in the workplace.Douglas identifies the antisocial personality, showing surprising similarities and differences among various types of deadly offenders. He also tracks the progressive escalation of those criminals' sociopathic behavior. His analysis of such diverse killers as Lee Harvey Oswald, Theodore Kaczynski, and Timothy McVeigh is gripping, but more importantly, helps us learn how to anticipate potential violent behavior before it's too late.

Reefer Madness: Sex, Drugs, and Cheap Labor in the American Black Market


Eric Schlosser - 2003
    In Reefer Madness the best-selling author of Fast Food Nation turns his exacting eye on the underbelly of the American marketplace and its far-reaching influence on our society. Exposing three American mainstays — pot, porn, and illegal immigrants — Eric Schlosser shows how the black market has burgeoned over the past several decades. He also draws compelling parallels between underground and overground: how tycoons and gangsters rise and fall, how new technology shapes a market, how government intervention can reinvigorate black markets as well as mainstream ones, and how big business learns — and profits — from the underground. Reefer Madness is a powerful investigation that illuminates the shadow economy and the culture that casts that shadow.(back cover)

Technopoly: The Surrender of Culture to Technology


Neil Postman - 1992
    In this witty, often terrifying work of cultural criticism, the author of Amusing Ourselves to Death chronicles our transformation into a Technopoly: a society that no longer merely uses technology as a support system but instead is shaped by it--with radical consequences for the meanings of politics, art, education, intelligence, and truth.

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information


Michael Bazzell - 2012
    In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details

Zucked: Waking Up to the Facebook Catastrophe


Roger McNamee - 2019
    He had mentored many tech leaders in his illustrious career as an investor, but few things had made him prouder, or been better for his fund's bottom line, than his early service to Mark Zuckerberg. Still a large shareholder in Facebook, he had every good reason to stay on the bright side. Until he simply couldn't. ZUCKED is McNamee's intimate reckoning with the catastrophic failure of the head of one of the world's most powerful companies to face up to the damage he is doing. It's a story that begins with a series of rude awakenings. First there is the author's dawning realization that the platform is being manipulated by some very bad actors. Then there is the even more unsettling realization that Zuckerberg and Sheryl Sandberg are unable or unwilling to share his concerns, polite as they may be to his face."

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal


M. Mitchell Waldrop - 2001
    C. R. Licklider, whose visionary dream of a human-computer symbiosis transformed the course of modern science and led to the development of the personal computer. Reprint.

The Education of a Coroner: Lessons in Investigating Death


John Bateson - 2017
    Judy Melinek’s Working Stiff, an account of the hair-raising and heartbreaking cases handled by the coroner of Marin County, California throughout his four decades on the job—from high-profile deaths to serial killers, to Golden Gate Bridge suicides.Marin County, California is a study in contradictions. Its natural beauty attracts thousands of visitors every year, yet the county also is home to San Quentin Prison, one of the oldest and largest penitentiaries in the country. Marin ranks in the top one percent of counties nationwide in terms of affluence and overall health, yet it is far above the norm in drug overdoses and alcoholism, and comprises a large percentage of suicides from the Golden Gate Bridge. Ken Holmes worked in the Marin County Coroner’s Office for thirty-six years, starting as a death investigator and ending as the three-term, elected coroner. As he grew into the job—which is different from what is depicted on television—Holmes learned a variety of skills, from finding hidden clues at death scenes, interviewing witnesses effectively, managing bystanders and reporters, preparing testimony for court to notifying families of a death with sensitivity and compassion. He also learned about different kinds of firearms, all types of drugs—prescription and illegal—and about certain unexpected and potentially fatal phenomena such as autoeroticism. Complete with poignant anecdotes, The Education of a Coroner provides a firsthand and fascinating glimpse into the daily life of a public servant whose work is dark and mysterious yet necessary for society to function.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News


Clint Watts - 2018
    In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.