Book picks similar to
Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex by Bill Blunden
nonfiction
computers
politics
military
Facts and Fears: Hard Truths from a Life in Intelligence
James R. Clapper - 2018
In Facts and Fears Clapper traces his career through his rise in ranks of the military, the history of several decades of national intelligence operations, the growing threat of cyberattacks, his relationships with presidents and Congress, and the truth about Russia's role in the presidential election. He describes, in the wake of Snowden and WikiLeaks, his efforts to make intelligence more transparent and to push back against the suspicion that Americans' private lives are subject to surveillance. Clapper considers such difficult questions as, is intelligence ethical? Is it moral to use human sources to learn secrets, to intercept communications, to take pictures of closed societies from orbit? What are the limits of what we should be allowed to do? What protections should we give to the private citizens of the world, not to mention our fellow Americans? Is there a time that intelligence officers can lose credibility as unbiased reporters of hard truths by asserting themselves into policy decisions?
Stealing the Network: How to Own an Identity
Raven Alder - 2005
Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
Life Undercover: Coming of Age in the CIA
Amaryllis Fox - 2019
Amaryllis Fox's memoir tells the story of her ten years in the most elite clandestine ops unit of the CIA, hunting the world's most dangerous terrorists in sixteen countries while marrying and giving birth to a daughter.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Paul Rosenzweig - 2013
Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
Robert B. Baer - 2002
This riveting book is both an indictment of an agency that lost its way and an unprecedented look at the roots of modern terrorism, and includes a new afterword in which Baer speaks out about the American war on terrorism and its profound implications throughout the Middle East.“Robert Baer was considered perhaps the best on-the-ground field officer in the Middle East.”–Seymour M. Hersh, The New YorkerFrom The PrefaceThis book is a memoir of one foot soldier’s career in the other cold war, the one against terrorist networks. It’s a story about places most Americans will never travel to, about people many Americans would prefer to think we don’t need to do business with.This memoir, I hope, will show the reader how spying is supposed to work, where the CIA lost its way, and how we can bring it back again. But I hope this book will accomplish one more purpose as well: I hope it will show why I am angry about what happened to the CIA. And I want to show why every American and everyone who cares about the preservation of this country should be angry and alarmed, too.The CIA was systematically destroyed by political correctness, by petty Beltway wars, by careerism, and much more. At a time when terrorist threats were compounding globally, the agency that should have been monitoring them was being scrubbed clean instead. Americans were making too much money to bother. Life was good. The White House and the National Security Council became cathedrals of commerce where the interests of big business outweighed the interests of protecting American citizens at home and abroad. Defanged and dispirited, the CIA went along for the ride. And then on September 11, 2001, the reckoning for such vast carelessness was presented for all the world to see.
Thatcher’s Spy: My Life as an MI5 Agent Inside Sinn Féin
Willie Carlin - 2019
So began the dramatic extraction of Margaret Thatcher’s key undercover agent in Sinn Féin – Willie Carlin, aka Agent 3007. For 11 years the former British soldier worked alongside former IRA commander Martin McGuinness in the republican movement’s political wing in Derry. He was MI5’s man at McGuinness’ side and gave the British State unprecedented insight into the IRA leader’s strategic thinking. Carlin worked with McGuinness to develop Sinn Féin’s election strategy after the 1981 hunger strike, and the MI5 and later FRU agent’s reports on McGuinness, Adams and other republicans were read by the British Cabinet, including Margaret Thatcher herself. When Carlin’s cover was blown in mid-1985 thanks to one of his old MI5 handlers being jailed as a Soviet spy, Thatcher authorised the use of her jet to whisk him to safety. Incredibly, it was another British ‘super spy’ inside the IRA’s secretive counter-intelligence unit, the ‘nuttin’ squad’, who saved Carlin’s life. The Derry man is perhaps the only person alive thanks to the information provided by the ‘jewel in the crown’ of British military intelligence – Freddie Scappaticci, aka Stakeknife. In Thatcher’s Spy, the Cold War meets Northern Ireland’s Dirty War in the remarkable real-life story of a deep under-cover British intelligence agent, a man now doomed forever to look over his shoulder. . .
Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier
Suelette Dreyfus - 1997
Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.
The Art of Intelligence
Henry A. Crumpton - 2012
In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.
The Wires of War: Technology and the Global Struggle for Power
Jacob Helberg - 2021
During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we’re fighting to control the software—applications, news information, social media platforms, and more—of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we’re also engaged in a hidden back-end battle—largely with China—to control the internet’s hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world’s balance of power for the coming century as autocracies exploit 21st-century methods to redivide the world into 20th-century-style spheres of influence. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. Helberg offers “unnervingly convincing evidence that time is running out in the ‘gray war’ with the enemies of freedom” (Kirkus Reviews) which could affect every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty.
Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda
Robert Wallace - 2008
It is a world where the intrigue of reality exceeds that of fiction. What is an invisible photo used for? What does it take to build a quiet helicopter? How does one embed a listening device in a cat? If these sound like challenges for Q, James Bondas fictional gadget-master, think again. Theyare all real-life devices created by the CIAas Office of Technical Serviceaan ultrasecretive department that combines the marvels of state-of-the-art technology with the time-proven traditions of classic espionage. And now, in the first book ever written about this office, the former director of OTS teams up with an internationally renowned intelligence historian to take readers into the laboratory of espionage. Spycraft tells amazing life and death stories about this littleknown group, much of it never before revealed. Against the backdrop of some of Americaas most critical periods in recent historyaincluding the Cold War, the Cuban Missile Crisis, and the war on terrorathe authors show the real technical and human story of how the CIA carries out its missions.
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age
Michael Chertoff - 2018
And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Blackwater: The Rise of the World's Most Powerful Mercenary Army
Jeremy Scahill - 2007
The shooting spree, labeled "Baghdad's Bloody Sunday," was neither the work of Iraqi insurgents nor U.S. soldiers. The shooters were private forces working for the secretive mercenary company, Blackwater Worldwide. This is the explosive story of a company that rose a decade ago from Moyock, North Carolina, to become one of the most powerful players in the "War on Terror." In his gripping bestseller, award-winning journalist Jeremy Scahill takes us from the bloodied streets of Iraq to hurricane-ravaged New Orleans to the chambers of power in Washington, to expose Blackwater as the frightening new face of the U.S. war machine.
Zero Hour for Gen X: How the Last Adult Generation Can Save America from Millennials
Matthew Hennessey - 2018
Soon Gen Xers will be the only cohort of Americans who remember life as it was lived before the arrival of the Internet. They are, as Hennessey dubs them, “the last adult generation,” the sole remaining link to a time when childhood was still a bit dangerous but produced adults who were naturally resilient. More than a decade into the social media revolution, the American public is waking up to the idea that the tech sector’s intentions might not be as pure as advertised. The mountains of money being made off our browsing habits and purchase histories are used to fund ever-more extravagant and utopian projects that, by their very natures, will corrode the foundations of free society, leaving us all helpless and digitally enslaved to an elite crew of ultra-sophisticated tech geniuses. But it’s not too late to turn the tide. There’s still time for Gen X to write its own future. A spirited defense of free speech, eye contact, and the virtues of patience, Zero Hour for Gen X is a cultural history of the last 35 years, an analysis of the current social and historical moment, and a generational call to arms.
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski - 2011
Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.