Book picks similar to
Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex by Bill Blunden
nonfiction
cyber-security
computers
military
Clevenger Gold: The True Story of Murder and Unfound Treasure
S.E. Swapp - 2016
Once the old, cantankerous Sam Clevenger and his wife, Charlotte, hired Frank Willson and John Johnson to help with the move, their fate took a dark turn. These true events were documented by journalists through the 1887 trial and well into the 1900s, and stories have been told of Sam’s unfound treasure for nearly 130 years. But, this is the first detailed, documented, and vetted account of their bizarre and fascinating tale.
If Then: How the Simulmatics Corporation Invented the Future
Jill Lepore - 2020
Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley.Founded in 1959 by some of the nation’s leading social scientists—“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”—Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains.The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale.
The Men Who Stare at Goats
Jon Ronson - 2004
Army. Defying all known accepted military practice -- and indeed, the laws of physics -- they believed that a soldier could adopt a cloak of invisibility, pass cleanly through walls, and, perhaps most chillingly, kill goats just by staring at them. Entrusted with defending America from all known adversaries, they were the First Earth Battalion. And they really weren't joking. What's more, they're back and fighting the War on Terror. With firsthand access to the leading players in the story, Ronson traces the evolution of these bizarre activities over the past three decades and shows how they are alive today within the U.S. Department of Homeland Security and in postwar Iraq. Why are they blasting Iraqi prisoners of war with the theme tune to Barney the Purple Dinosaur? Why have 100 debleated goats been secretly placed inside the Special Forces Command Center at Fort Bragg, North Carolina? How was the U.S. military associated with the mysterious mass suicide of a strange cult from San Diego? The Men Who Stare at Goats answers these and many more questions.
iWar: War and Peace in the Information Age
Bill Gertz - 2017
Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
Theresa M. Payton - 2014
The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
The Corruption Chronicles: Obama's Big Secrecy, Big Corruption, and Big Government
Tom Fitton - 2012
president; it was the very cornerstone of his campaign. No secrets. No masks. No smoke and mirrors. No excuses. But over the next four years, President Obama’s administration would prove to be one of the most guarded and duplicitous of our time. Tom Fitton of Judicial Watch, America’s largest nonpartisan government watchdog (challenging George W. Bush as well as Bill Clinton), has been investigating Obama ever since he splashed onto the national scene in 2006. Now Fitton exposes devastating secrets the Obama administration has desperately fought—even in court—to keep from the American public. For a while, the Obama stonewall seemed to be holding. Until now. And the revelations are astonishing. Judicial Watch has unearthed the truth behind such high-profile issues as the bailouts, Obamacare, Guantanamo, Obama’s true ties to Bill Ayers and to the Black Panthers voting intimidation scandal, and the Constitution-defying government czars. He reveals Obama’s personal war against FOX News, his real link to ACORN, and his radical Chicago connections. Through scores of smoking-gun government files, some replicated here and many unearthed after lengthy court battles, Fitton also discloses the facts of the Obama-backed $535-million loan guarantee to Solyndra, promoted by the president as a model for economic recovery—only months before its disastrous bankruptcy filing. Here too is the truth behind the gunrunning scandal, code-named Fast and Furious, which was a program generated in secrecy by the U.S. government that supplied thousands of firearms to murderous criminals in Mexico—an unconscionable act, and only one in a series of historical lows for an administration that few, if any, major media in this country dare to expose. This book details how the Obama machine is aggressively employing Chicago-style tactics to steal, if necessary, the 2012 elections. And how Judicial Watch is prepared to go to court with historic lawsuits to make sure the elections are fair and honest. Why do Obama supporters turn a blind eye to his astoundingly unethical and abusive approach to governing this country? The Corruption Chronicles boldly, honestly, and factually makes the case that the federal government is now off the rails and out of control, and has literally built its foundation on broken promises, fatal miscalculations, and a cynical manipulation of its trusting public. But it’s not over. Tom Fitton and Judicial Watch are proof that the Tea Party approach to government corruption can make a difference. A grassroots group can take on the president, the Congress, and the judiciary, and finally force the government to be held accountable. The uncontestable facts are here, in The Corruption Chronicles. To see what is true, you only have to look. THE FULLY DOCUMENTED FACTS BEHIND: • The Solyndra Debacle • Obama’s Watergate: Operation Fast and Furious • The Obama Administration’s $20 Billion Government Extortion Scheme • The Unprecedented Threat to the Integrity of the 2012 Elections • The Czar Investigation Stonewall • The Undermining of Our Nation’s Immigration Laws • 9/11 Secrets
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
Palm Beach Babylon: The Sinful History of America's Super-Rich Paradise
Murray Weiss - 1992
Starting with the island's founder Henry Flagler, and updated for Kindle, "Palm Beach Babylon" chronicles the Kennedys, the Trumps, the Dodges, Helmsleys, Pulitzers, Vanderbilts, Mizners and Madoffs, and many more "Titans of Industry" and "Royalty." "The history is solid, the writing stylish," wrote renowned author Pete Hamill. "Riveting," exclaimed Nicholas Pileggi, author of "Wiseguy" and "Casino." The New York Times declared "Palm Beach Babylon" the best book ever written on the storied tropical island, where the "Rich and Famous" flock every winter to indulge in a world that only money can pierce. "Murray Weiss and Bill Hoffmann have . . . produced an intriguing account of the wagers of too much wealth and too much leisure time," wrote Dominick Dunne, the best selling novelist and true-crime expert. And as one reader posted along with 5-Stars: A REAL PAGE TURNER: I loved this book because it had all the allure of great fiction, yet it was about real people who, although they live in a real place (Palm Beach, FL), seem more like Great Gatsby characters than anything else! It also provides a fascinating historical perspective of the glamorous Palm Beach, how it was built, the man who built it, and the wealthy who flocked to it.
Collateral Damage: Britain, America, and Europe in the Age of Trump
Kim Darroch - 2020
"@realDonaldTrump: The wacky ambassador that the UK foisted on the United States is not someone we are thrilled with, a very stupid guy . . . We will no longer deal with him." Kim Darroch is one of the UK's most experienced and respected diplomats, and this unvarnished, behind-the-scenes account will reveal the inside story behind his resignation; describe the challenges of dealing with the Trump White House; and offer a diplomat's perspective on Brexit, and how it looked to Britain's closest ally. Darroch was the British Ambassador to the US as the age of Trump dawned and Brexit unfolded. He explains why the British embassy expected a Trump victory from as early as February 2016, what part every key figure—from Steve Bannon to Sarah Sanders—has played in Trump's administration, and what balanced policy makers on both sides of the Atlantic should consider during this era of seismic change and populist politics. A riveting account from the best-informed insider, Collateral Damage charts the strangest and most convulsive period in the recent history of Britain and the US—and shows how thirty months threatened to overturn three centuries of history.
That Used to Be Us: How America Fell Behind in the World It Invented and How We Can Come Back
Thomas L. Friedman - 2011
We face four major challenges on which our future depends, and we are failing to meet them—and if we delay any longer, soon it will be too late for us to pass along the American dream to future generations. In That Used to Be Us, Thomas L. Friedman, one of our most influential columnists, and Michael Mandelbaum, one of our leading foreign policy thinkers, offer both a wake-up call and a call to collective action. They analyze the four challenges we face—globalization, the revolution in information technology, the nation's chronic deficits, and our pattern of excessive energy consumption—and spell out what we need to do now to sustain the American dream and preserve American power in the world. They explain how the end of the Cold War blinded the nation to the need to address these issues seriously, and how China's educational successes, industrial might, and technological prowess remind us of the ways in which "that used to be us." They explain how the paralysis of our political system and the erosion of key American values have made it impossible for us to carry out the policies the country urgently needs. And yet Friedman and Mandelbaum believe that the recovery of American greatness is within reach. They show how America's history, when properly understood, offers a five-part formula for prosperity that will enable us to cope successfully with the challenges we face. They offer vivid profiles of individuals who have not lost sight of the American habits of bold thought and dramatic action. They propose a clear way out of the trap into which the country has fallen, a way that includes the rediscovery of some of our most vital traditions and the creation of a new thirdparty movement to galvanize the country. That Used to Be Us is both a searching exploration of the American condition today and a rousing manifesto for American renewal.
Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto - 2011
Users hold the crypto keys to their own money and transact directly with each other, with the help of a P2P network to check for double-spending.https://bitcoin.org/bitcoin.pdf
INTEL: Inside Indonesia's Intelligence Service
Kenneth J. Conboy - 2003
Whether targeting communist diplomats, foreign terrorists, or domestic dissidents, BIN and its precursor organizations have been the covert spearhead of the nation's security policy. Here, for the first time, this secretive agency is exposed in INTEL: Inside Indonesia's Intelligence Service by noted author Ken Conboy. Drawing from exclusive access to BIN's personnel and operational archives, Conboy examines the agents and their operations since BIN's founding fifty years ago, and sheds new light on Indonesia's role in the Cold War with case studies of North Korean, Soviet, and Vietnamese operations across the archipelago and BIN's current position at the forefront on the war against terrorism. From the activities and subsequent captures of both Faruq and Hambali to the Indonesian operations of al-Qaeda, this book provides far more detail and insight than previously available. Understanding BIN is an integral part of understanding the politics and security of Indonesia, and INTEL is essential reading for anyone interested in intelligence operations, contemporary Indonesian history, and international terrorism. KEN CONBOY is country manager for Risk Management Advisory, a private security consultancy in Jakarta. Prior to that, he served as deputy director at the Asian Studies Center, an influential Washington-based think tank, where his duties including writing policy papers for the U.S. Congress and Executive on economic and strategic relations with the nations of South and Southeast Asia. The author of a dozen books about Asian military history and intelligence operations, Conboy's most recent title, Spies in the Himalayas, has earned praise as an intriguing account of high-altitude mountaineering and covert missions. A graduate of Georgetown University's School of Foreign Service and of Johns Hopkins' School of Advanced International Studies, Conboy was also a visiting fellow at Chulalongkorn University in Bangkok and has lived in Indonesia since 1992.
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
Cartel: The Coming Invasion of Mexico's Drug Wars
Sylvia Longmire - 2011
The cartels have grown increasingly bold in recent years, building submarines to move up the coast of Central America and digging elaborate tunnels that both move drugs north and carry cash and U.S. high-powered assault weapons back to fuel the drug war. Channeling her long experience working on border issues, Longmire brings to life the very real threat of Mexican cartels operating not just along the southwest border, but deep inside every corner of the United States. She also offers real solutions to the critical problems facing Mexico and the United States, including programs to deter youth in Mexico from joining the cartels and changing drug laws on both sides of the border.