Book picks similar to
Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex by Bill Blunden
nonfiction
cyber-security
politics
computers
The New Digital Age: Reshaping the Future of People, Nations and Business
Eric Schmidt - 2013
And, the Director of Google Ideas, Jared Cohen, formerly an advisor to both Secretaries of State Condoleezza Rice and Hillary Clinton.Never before has the future been so vividly and transparently imagined. From technologies that will change lives (information systems that greatly increase productivity, safety and our quality of life, thought controlled motion technology that can revolutionize medical procedures, and near-perfect translation technology that allows us to have more diversified interactions) to our most important future considerations (curating our online identity and fighting those who would do harm with it) to the widespread political change that will transform the globe (through transformations in conflict, increasingly active and global citizenries, a new wave of cyber-terrorism and states operating simultaneously in the physical and virtual realms) to the ever present threats to our privacy and security, Schmidt and Cohen outline in great detail and scope all the promise and peril awaiting us in the coming decades.
Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan
Steve Coll - 2018
While the US was trying to quell extremists, a highly secretive and compartmentalized wing of I.S.I., known as "Directorate S," was covertly training, arming, and seeking to legitimize the Taliban, in order to enlarge Pakistan's sphere of influence. After 9/11, when fifty-nine countries, led by the U. S., deployed troops or provided aid to Afghanistan in an effort to flush out the Taliban and Al Qaeda, the U.S. was set on an invisible slow-motion collision course with Pakistan.Today we know that the war in Afghanistan would falter badly because of military hubris at the highest levels of the Pentagon, the drain on resources and provocation in the Muslim world caused by the U.S.-led invasion of Iraq, and corruption. But more than anything, as Coll makes painfully clear, the war in Afghanistan was doomed because of the failure of the United States to apprehend the motivations and intentions of I.S.I.'s "Directorate S". This was a swirling and shadowy struggle of historic proportions, which endured over a decade and across both the Bush and Obama administrations, involving multiple secret intelligence agencies, a litany of incongruous strategies and tactics, and dozens of players, including some of the most prominent military and political figures. A sprawling American tragedy, the war was an open clash of arms but also a covert melee of ideas, secrets, and subterranean violence. Coll excavates this grand battle, which took place away from the gaze of the American public. With unsurpassed expertise, original research, and attention to detail, he brings to life a narrative at once vast and intricate, local and global, propulsive and painstaking. This is the definitive explanation of how America came to be so badly ensnared in an elaborate, factional, and seemingly interminable conflict in South Asia. Nothing less than a forensic examination of the personal and political forces that shape world history, Directorate S is a complete masterpiece of both investigative and narrative journalism.
The Hunt for KSM: Inside the Pursuit and Takedown of the Real 9/11 Mastermind, Khalid Sheikh Mohammed
Terry McDermott - 2012
Only minutes after United 175 plowed into the World Trade Center's South Tower, people in positions of power correctly suspected who was behind the assault: Osama bin Laden and Al Qaeda. But it would be 18 months after September 11 before investigators would capture the actual mastermind of the attacks, the man behind bin Laden himself. That monster is the man who got his hands dirty while Osama fled; the man who was responsible for setting up Al Qaeda's global networks, who personally identified and trained its terrorists, and who personally flew bomb parts on commercial airlines to test their invisibility. That man withstood waterboarding and years of other intense interrogations, not only denying Osama's whereabouts but making a literal game of the proceedings, after leading his pursuers across the globe and back. That man is Khalid Sheikh Mohammed, and he is still, to this day, the most significant Al Qaeda terrorist in captivity. In The Hunt for KSM, Terry McDermott and Josh Meyer go deep inside the US government's dogged but flawed pursuit of this elusive and dangerous man. One pair of agents chased him through countless false leads and narrow escapes for five years before 9/11. And now, drawing on a decade of investigative reporting and unprecedented access to hundreds of key sources, many of whom have never spoken publicly -- as well as jihadis and members of KSM's family and support network -- this is a heart-pounding trip inside the dangerous, classified world of counterterrorism and espionage.
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Richard Bejtlich - 2004
This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.
God, Trump, and the 2020 Election: Why He Must Win and What's at Stake for Christians if He Loses
Stephen E. Strang - 2020
Evangelicals who recognized this backed him more than any other presidential candidate in history. Heading into 2020, the stakes in his reelection are even higher. This election, nine months after this book releases, is a new fight for the soul of America. Stephen E. Strang makes the case that God wants America to be great because God has raised up America—beginning with our Founding Fathers—to be a beacon of light and hope for the world. We’ve been the nation with religious liberty that has supported those who have spread the gospel around the world.In this book Strang looks at the election, Trump, and America from a spiritual perspective and helps Christians (and others) see God’s hand at work. This book is as much about God and His purposes as about Donald Trump. But it is also an articulate, impassioned apologetic about why all Christians must support this imperfect president, because he has God’s blessing and because the destiny of America is riding on his reelection. This book also explores why he might lose, if his base is overconfident and doesn’t vote or if his opponents are dishonest enough to steal the election.God, Trump, and the 2020 Election is an inside look at how the political climate is affected by spiritual warfare—an important subject for Bible-believing Christians. The satanic schemes are so brazen on key issues that the book was written to explain what’s at stake. Strang believes that the intersection of faith and politics needs to be part of the national discussion about the division in our country.Other Books By Stephen E. Strang:God and Donald Trump (2017) ISBN-13: 978-1629994864Trump Aftershock (2018)ISBN-13: 978-1629995557
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government
David Talbot - 2015
Drawing on revelatory new materials—including newly discovered U.S. government documents, U.S. and European intelligence sources, the personal correspondence and journals of Allen Dulles’s wife and mistress, and exclusive interviews with the children of prominent CIA officials—Talbot reveals the underside of one of America’s most powerful and influential figures.Dulles’s decade as the director of the CIA—which he used to further his public and private agendas—were dark times in American politics. Calling himself “the secretary of state of unfriendly countries,” Dulles saw himself as above the elected law, manipulating and subverting American presidents in the pursuit of his personal interests and those of the wealthy elite he counted as his friends and clients—colluding with Nazi-controlled cartels, German war criminals, and Mafiosi in the process. Targeting foreign leaders for assassination and overthrowing nationalist governments not in line with his political aims, Dulles employed those same tactics to further his goals at home, Talbot charges, offering shocking new evidence in the assassination of President John F. Kennedy.An exposé of American power that is as disturbing as it is timely, The Devil’s Chessboard is a provocative and gripping story of the rise of the national security state—and the battle for America’s soul.
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
The Living Constitution
David A. Strauss - 2010
He wanted a dead Constitution, he joked, arguing it must be interpreted as the framers originally understood it.In The Living Constitution, leading constitutional scholar David Strauss forcefully argues against the claims of Scalia, Clarence Thomas, Robert Bork, and other originalists, explaining in clear, jargon-free English how the Constitution can sensibly evolve, without falling into the anything-goes flexibility caricatured by opponents. The living Constitution is not an out-of-touch liberal theory, Strauss further shows, but a mainstream tradition of American jurisprudence--a common-law approach to the Constitution, rooted in the written document but also based on precedent. Each generation has contributed precedents that guide and confine judicial rulings, yet allow us to meet the demands of today, not force us to follow the commands of the long-dead Founders. Strauss explores how judicial decisions adapted the Constitution's text (and contradicted original intent) to produce some of our most profound accomplishments: the end of racial segregation, the expansion of women's rights, and the freedom of speech. By contrast, originalism suffers from fatal flaws: the impossibility of truly divining original intent, the difficulty of adapting eighteenth-century understandings to the modern world, and the pointlessness of chaining ourselves to decisions made centuries ago.David Strauss is one of our leading authorities on Constitutional law--one with practical knowledge as well, having served as Assistant Solicitor General of the United States and argued eighteen cases before the United States Supreme Court. Now he offers a profound new understanding of how the Constitution can remain vital to life in the twenty-first century.
Gray Day: My Undercover Mission to Expose America's First Cyber Spy
Eric O'Neill - 2019
With zero training in face-to-face investigation, O'Neill found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies--and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a fondness for handguns. In the months that follow, O'Neill's self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches O'Neill the game of spycraft. The student will just have to learn to outplay his teacher if he wants to win.A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage--and how we might begin to catch up.
The Secrets of the FBI
Ronald Kessler - 2011
Based on inside access, the book presents revelations about the raid on Osama bin Laden's compound, the recent Russian spy swap, Marilyn Monroe's death, Vince Foster’s suicide, and J. Edgar Hoover’s sexual orientation. For the first time, it tells how the FBI caught spy Robert Hanssen in its midst and how the FBI breaks into homes, offices, and embassies to plant bugging devices without getting caught.From Watergate to Waco, from congressional scandals to the killing of bin Laden, The Secrets of the FBI presents headline-making disclosures about the most important figures and events of our time.
The Internet Police: How Crime Went Online, and the Cops Followed
Nate Anderson - 2013
It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.
An Execution in the Family: One Son's Journey
Robert Meeropol - 2003
It is the story of how he tried to balance a strong desire to live a normal life and raise a family, with a growing need to create something useful out of his nightmare childhood. It is also a poignant account of how, at age forty-three, he finally found a way to honor his parents and also be true to himself.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
John P. Carlin - 2018
We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us.As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed.The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.