The Filter Bubble: What the Internet is Hiding From You


Eli Pariser - 2011
    Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years - the rise of personalization. In this groundbreaking investigation of the new hidden Web, Pariser uncovers how this growing trend threatens to control how we consume and share information as a society-and reveals what we can do about it.Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Facebook - the primary news source for an increasing number of Americans - prioritizes the links it believes will appeal to you so that if you are a liberal, you can expect to see only progressive links. Even an old-media bastion like "The Washington Post" devotes the top of its home page to a news feed with the links your Facebook friends are sharing. Behind the scenes a burgeoning industry of data companies is tracking your personal information to sell to advertisers, from your political leanings to the color you painted your living room to the hiking boots you just browsed on Zappos.In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs - and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.While we all worry that the Internet is eroding privacy or shrinking our attention spans, Pariser uncovers a more pernicious and far-reaching trend on the Internet and shows how we can - and must - change course. With vivid detail and remarkable scope, The Filter Bubble reveals how personalization undermines the Internet's original purpose as an open platform for the spread of ideas and could leave us all in an isolated, echoing world.

Mobsters, Madams Murder in Steubenville, Ohio: The Story of Little Chicago


Susan M. Guy - 2014
    The white slave trade was rampant, and along with all the vice crimes, murders became a weekly occurrence. Law enforcement seemed to turn a blind eye, and cries of political corruption were heard in the state capital. This scenario replayed itself over and over again during the past century as mobsters and madams ruled and murders plagued the city and county at an alarming rate.

The Moscow Rules: The Secret CIA Tactics That Helped America Win the Cold War


Antonio J. Méndez - 2019
    Soviets kept files on all foreigners, studied their patterns, tapped their phones, and even planted listening devices within the US Embassy. In short, intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthrough that turned the odds in America's favor. As Chief of Disguise and Authentication, Mendez was instrumental in creating and honing a series of tactics that allowed officers to finally get one step ahead of the KGB. These techniques included everything from elaborate, Hollywood-inspired identity swaps, to deception or evasion techniques, to more mundane document forgery. With these new guidelines in place, and with an armory of new gadgets perfected by the Office of Technical Services including miniature cameras, suitcase release body doubles, and wall repelling mechanisms, the CIA managed to gain a foothold in Moscow and pull off some of the greatest intelligence operations in the history of espionage. As America is again confronted by the threat of Russian disinformation, the dramatic inside story of how we defeated our once-and-future enemy is as timely as ever.

How the Internet Happened: From Netscape to the iPhone


Brian McCullough - 2018
    In How the Internet Happened, he chronicles the whole fascinating story for the first time, beginning in a dusty Illinois basement in 1993, when a group of college kids set off a once-in-an-epoch revolution with what would become the first “dotcom.”Depicting the lives of now-famous innovators like Netscape’s Marc Andreessen and Facebook’s Mark Zuckerberg, McCullough also reveals surprising quirks and unknown tales as he tracks both the technology and the culture around the internet’s rise. Cinematic in detail and unprecedented in scope, the result both enlightens and informs as it draws back the curtain on the new rhythm of disruption and innovation the internet fostered, and helps to redefine an era that changed every part of our lives.

The Pentagon Papers


Neil Sheehan - 1971
    'The Washington Post' called them "the most significant material in American history" and they remain relevant today as a reminder of the importance of a free press and First Amendment rights. 'THE PENTAGON PAPERS' demonstrated that the government had systemically lied to both the public and to Congress.THIS INCOMPARABLE VOLUME INCLUDES:• The Truman and Eisenhower Years: 1945-1960 by Fox Butterfield• Origins of the insurgency in South Vietnam by Fox Butterfield• The Kennedy Years: 1961-1963 by Hedrick Smith• The Overthrow of Ngo Dinh Diem: May-November, 1963 by Hedrick Smith• The Covert War and Tonkin Gulf: February-August, 1964 by Neil Sheehan• The Consensus to Bomb North Vietnam: August, 1964-February, 1965 by Neil Sheehan• The Launching of the Ground War: March-July, 1965 by Neil Sheehan• The Buildup: July, 1965-September, 1966 by Fox Butterfield• Disenchantment: October, 1966-May, 1967 by Hedrick Smith• The Tet Offensive and the Turnaround by E.W. Kenworthy• Analysis and Comment• Court Records• Biographies of Key FiguresWith a brand-new foreword by James L. Greenfield, this edition of the Pulitzer Prize-winning story is sure to provoke discussion about free press and government deception, and shed some light on issues in the past and the present so that we can better understand and improve the futureRUNNING TIME ⇒ 37hrs.©2018 Neil Sheehan, E.W. Kenworthy, Fox Butterfield, Hendrick Smith (P)2018 Brilliance Audio, Inc., all rights reserved.

Mortal Error: The Shot That Killed JFK


Bonar Menninger - 1993
    Another conspiracy theory identifies the two men who, operating separately, allegedly shot President Kennedy in the ""Crime of the Century."" Reprint.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy


Cathy O'Neil - 2016
    Increasingly, the decisions that affect our lives--where we go to school, whether we can get a job or a loan, how much we pay for health insurance--are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.But as mathematician and data scientist Cathy O'Neil reveals, the mathematical models being used today are unregulated and uncontestable, even when they're wrong. Most troubling, they reinforce discrimination--propping up the lucky, punishing the downtrodden, and undermining our democracy in the process.

The Future of the Internet and How to Stop It


Jonathan L. Zittrain - 2008
    With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download

True Believer: Inside the Investigation and Capture of Ana Montes, Cuba's Master Spy


Scott W. Carmichael - 2007
    Known to her coworkers as the Queen of Cuba, she was an overachiever who advanced quickly through the ranks of Latin American specialists to become the intelligence community's top analyst on Cuban affairs. But throughout her sixteen-year career at DIA, Montes was sending Castro some of America's most closely guarded secrets and at the same time helping influence what the United States thought it knew about Cuba. When she was finally arrested in September 2001, she became the most senior American intelligence official ever accused of operating as a Cuban spy from within the federal U.S. government. Unrepentant as she serves out her time in a federal prison in Texas, Montes remains the only member of the intelligence community ever convicted of espionage on behalf of the Cuban government.This inside account of the investigation that led to her arrest has been written by Scott W. Carmichael, the DIA's senior counterintelligence investigator who persuaded the FBI to launch an investigation. Although Montes did not fit the FBI's profile of a spy and easily managed to defeat the agency's polygraph exams, Carmichael became suspicious of her activities and with the FBI over a period of several years developed a solid case against her. Here he tells the story of that long and ultimately successful spy hunt. Carmichael reveals the details of their efforts to bring her to justice, offering readers a front-row seat for the first major U.S. espionage case of the twentieth century. She was arrested less than twenty-four hours before learning details of the U.S. plan to invade Afghanistan post-September 11. Motivated by ideology not money, Montes was one of the last true believers of the communist era. Because her arrest came just ten days after 9/11, it went largely unnoticed by the American public. This book calls attention to the grave damage Montes inflicted on U.S. security--Carmichael even implicates her in the death of a Green Beret fighting Cuban-backed insurgents in El Salvador--and the damage she would have continued to inflict had she not been caught.

Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.


Don Murdoch - 2014
    The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.

The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies


Erik Brynjolfsson - 2014
    Digital technologies—with hardware, software, and networks at their core—will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.In The Second Machine Age MIT’s Erik Brynjolfsson and Andrew McAfee—two thinkers at the forefront of their field—reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.Amid this bounty will also be wrenching change. Professions of all kinds—from lawyers to truck drivers—will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.A fundamentally optimistic book, The Second Machine Age alters how we think about issues of technological, societal, and economic progress.

The Craft of Intelligence: America's Legendary Spy Master on the Fundamentals of Intelligence Gathering for a Free World


Allen W. Dulles - 1962
    Dulles's The Craft of Intelligence. This classic of spycraft is based on Dulles's incomparable experience as a diplomat, international lawyer, and America's premier intelligence officer. Dulles was a high-ranking officer of the CIA's predecessor - the Office of Strategic Services - and served eight years as director of the newly created CIA.In The Craft of Intelligence, Dulles reveals how intelligence is collected and processed, and how the results contribute to the formation of national policy. He discusses methods of surveillance and the usefulness of defectors from hostile nations. His knowledge of Cold War Soviet espionage techniques is unrivaled, and he explains how the Soviet State Security Service recruited operatives and planted "illegals" in foreign countries. In an account enlivened with a wealth of personal anecdotes, Dulles also addresses the Bay of Pigs incident, denying that the 1961 invasion was based on a CIA estimate that a popular Cuban uprising would ensue. He spells out not only the techniques of modern espionage but also the philosophy and role of intelligence in a free society threatened by global conspiracies.This is a book for readers who seek wider understanding of the contribution of intelligence to our national security.

The Taking of K-129: How the CIA Used Howard Hughes to Steal a Russian Sub in the Most Daring Covert Operation in History


Josh Dean - 2017
    Navy, and a crazy billionaire spent six years and nearly a billion dollars to steal the nuclear-armed Soviet submarine K-129 after it had sunk to the bottom of the Pacific Ocean; all while the Russians were watching.In the early hours of February 25, 1968, a Russian submarine armed with three nuclear ballistic missiles set sail from its base in Siberia on a routine combat patrol to Hawaii. It never arrived. As the Soviet Navy searched in vain for the lost vessel, a top-secret American operation using sophisticated deep-sea spy equipment found it—wrecked on the sea floor at a depth of 16,800 feet, far beyond the capabilities of any salvage that existed. But the potential intelligence assets onboard the ship—the nuclear warheads, battle orders, and cryptological machines—justified going to extreme lengths to find a way to raise the submarine.So began Project Azorian, a top-secret mission that took six years, cost an estimated $800 million, and would become the largest and most daring covert operation in CIA history. After the U.S. Navy declared retrieving the sub “impossible,” the mission fell to the CIA's burgeoning Directorate of Science and Technology, the little-known division responsible for the legendary U-2 and SR-71 Blackbird spy planes. Working with Global Marine Systems, the country's foremost maker of exotic, deep-sea drill ships, the CIA commissioned the most expensive ship ever built and told the world that it belonged to the reclusive billionaire Howard Hughes, who would use the mammoth vessel to mine rare minerals from the ocean floor. In reality, a complex network of spies, scientists, and politicians attempted a project even crazier than Hughes’s reputation: raising the sub directly under the watchful eyes of the Russians. The Taking of K-129 is a riveting, almost unbelievable true-life tale of military history, engineering genius, and high-stakes spy-craft set during the height of the Cold War, when nuclear annihilation was a constant fear, and the opportunity to gain even the slightest advantage over your enemy was worth massive risk.

Skunk Works: A Personal Memoir of My Years at Lockheed


Ben R. Rich - 1994
    As recounted by Ben Rich, the operation's brilliant boss for nearly two decades, the chronicle of Lockheed's legendary Skunk Works is a drama of cold war confrontations and Gulf War air combat, of extraordinary feats of engineering & achievement against fantastic odds. Here are up-close portraits of the maverick band of scientists & engineers who made the Skunk Works so renowned. Filled with telling personal anecdotes & high adventure, with narratives from the CIA & from Air Force pilots who flew the many classified, risky missions, this book is a portrait of the most spectacular aviation triumphs of the 20th century.