Book picks similar to
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner
non-fiction
security
technology
politics
The Darkening Web: The War for Cyberspace
Alexander Klimburg - 2017
Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states' ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict--ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war--but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today--and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War--and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.
Surveillance Valley: The Rise of the Military-Digital Complex
Yasha Levine - 2018
This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.
The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda
Ali H. Soufan - 2011
Soufan was handed a secret file. Had he received it months earlier—when it was requested—the attacks on New York and Washington could have been prevented. During his time on the front lines, Soufan helped thwart plots around the world and elicited some of the most important confessions from terrorists in the war against al-Qaeda—without laying so much as a hand on them. Most of these stories have never been reported before, and never by anyone with such intimate firsthand knowledge.This narrative account of America's successes and failures against al-Qaeda is essential to an understanding of the terrorist group. We are taken into hideouts and interrogation rooms. We have a ringside seat at bin Laden's personal celebration of the 9/11 bombings. Such riveting details show us not only how terrorists think and operate but also how they can be beaten and brought to justice.
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
American Radical: Inside the World of an Undercover Muslim FBI Agent
Tamer Elnoury - 2017
But for the first time in this memoir, an active Muslim American federal agent reveals his experience infiltrating and bringing down a terror cell in North America.A longtime undercover agent, Tamer Elnoury joined an elite counterterrorism unit after September 11. Its express purpose is to gain the trust of terrorists whose goals are to take out as many Americans in as public and as devastating a way possible. It's a furious race against the clock for Tamer and his unit to stop them before they can implement their plans. Yet as new as this war still is, the techniques are as old as time: listen, record, and prove terrorist intent.Due to his ongoing work for the FBI, Elnoury writes under a pseudonym. An Arabic-speaking Muslim American, a patriot, a hero: To many Americans, it will be a revelation that he and his team even exist, let alone the vital and dangerous work they do keeping all Americans safe.
Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union
Stephen Budiansky - 2016
The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
At the Abyss: An Insider's History of the Cold War
Thomas Reed - 2004
presidents to outmaneuver the Russians, the Vietnam war, and the fall of the Berlin Wall. Original.
The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States
National Commission on Terrorist Attacks Upon The United States - 2004
In Lower Manhattan, on a field in Pennsylvania, and along the banks of the Potomoc, the United States suffered the single largest loss of life from an enemy attack on its soil.In November 2002 the United States Congress and President George W. Bush established by law the National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission. This independent, bipartisan panel was directed to examine the facts and circumstances surrounding the September 11 attacks, identify lessons learned, and provide recommendations to safeguard against future acts of terrorism. This volume is the authorized edition of the Commission's final report. This volume is the authorized edition of the Commission's final report.
Masters of Deception: The Gang That Ruled Cyberspace
Michelle Slatalla - 1995
"An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour
Hiding from the Internet: Eliminating Personal Online Information
Michael Bazzell - 2012
Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
The Mueller Report
Robert S. Mueller III - 2019
This investigation includes any possible links or coordination between Donald Trump's presidential campaign and the Russian government, "and any matters that arose or may arise directly from the investigation." The scope of the investigation reportedly includes potential obstruction of justice by Trump and others. The investigation, since it began on May 17, 2017, has been conducted by the United States Department of Justice Special Counsel's Office, headed by Robert Mueller, a Republican and former Director of the Federal Bureau of Investigation (FBI). This book chronicles the legal actions Mueller has taken against Trumps associates in the 2016 Presidential Elections.