The Bhutto Murder Trail: From Waziristan To GHQ


Amir Mir - 2010
    Drawing on personal anecdotes, meeting, off-the record conversations with Benazir Bhutto, and the emails that he exchanged with her just before her death, Amir Mir, one of Pakistan's leading investigative journalist, brings us a carefully documented reconstruction of the assassination that rocked the world.

Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power


David E. Sanger - 2012
    . . THE CRITICAL MOMENTS IN THE COVERT WAR AGAINST IRAN, THE STRUGGLES TO DEAL WITH A RECALCITRANT PAKISTAN AND ITS FAST-GROWING NUCLEAR ARSENAL, THE TENSIONS WITH THE AMERICAN MILITARY OVER AFGANISTAN AND WITH ALLIES SWEPT UP IN THE CHAOS OF THE ARAB SPRING Three and a half years ago, David Sanger’s book The Inheritance: The World Obama Confronts and the Challenges to American Power described how a new American president came to office with the world on fire. Now, just as the 2012 presidential election battle begins, Sanger follows up with an eye-opening, news-packed account of how Obama has dealt with those challenges, relying on innovative weapons and reconfigured tools of American power to try to manage a series of new threats. Sanger describes how Obama’s early idealism about fighting “a war of necessity” in Afghanistan quickly turned to fatigue and frustration, how the early hopes that the Arab Spring would bring about a democratic awakening slipped away, and how an effort to re-establish American power in the Pacific set the stage for a new era of tensions with the world’s great rising power, China. As the world seeks to understand the contours of the Obama Doctrine, Confront and Conceal is a fascinating, unflinching account of these complex years, in which the president and his administration have found themselves struggling to stay ahead in a world where power is diffuse and America’s ability to exert control grows ever more elusive.

Hiding from the Internet: Eliminating Personal Online Information


Michael Bazzell - 2012
    Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle

Social Media: Strategies To Mastering Your Brand- Facebook, Instagram, Twitter and Snapchat (Social Media, Social Media Marketing)


David Kelly - 2016
    You'll be excited to see all the opportunities from your social media growth and presence just from these advanced strategies. Would you like to know more about: The Advance Strategies That The Pros Use. Doubling Your Instagram Followers Understanding Facebook Ad marketing Top Strategies For Growth Monetizing Your Social Media This book breaks training down into easy-to-understand modules. It starts from the very beginning of dog training, so you can get great results - even as a beginner! Download Social Media:Strategies To Mastering Your Brand- Facebook, Instagram, Twitter and Snapchat Scroll to the top and select the "BUY" button for instant download. You’ll be happy you did!

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

Fallen: The inside story of the secret trial and conviction of Cardinal George Pell


Lucie Morris-Marr - 2019
    'Guilty' he pronounced five times. The third most senior Catholic cleric in the world had been found guilty of sex crimes against children, bringing shame to the Church on a scale never seen before in its history. Investigative journalist Lucie Morris-Marr was the first to break the story that Cardinal George Pell was being investigated by the police. In this riveting dispatch, she recounts how the cleric was trailed by a cloud of scandal as he rose to the most senior ranks of the church in Australia, all the way to his appointment by Pope Francis to the position of treasurer in the Vatican.Despite anger and accusations, it seemed nothing could stop George Pell. Yet in 2017 he was charged by detectives, returning to Australia to face trial.Take a front row seat in court with the author as she reveals the many intriguing developments in the secret legal proceedings which the media could not report at the time. Fallen reveals the full story of the brutal battle waged by the prince of the church as he fought to clear his name, including a ferocious bid to be freed from jail. The author also shares her own compelling personal journey investigating the biggest story of her career and the frequent attacks she endured from powerful Pell supporters. This book also charts how Pell's shocking conviction plunged the Vatican into an unprecedented global crisis after decades of clergy abuse cases. It is a vitally important story that will fascinate anyone interested in the failure of the Catholic Church to address the canker in its heart.

DarkMarket: Cyberthieves, Cybercops and You


Misha Glenny - 2011
    The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.

Landmark Judgments That Changed India


Asok Kumar Ganguly - 2015
    Of these, it is the judiciary’s task to uphold constitutional values and ensure justice for all. The interpretation and application of constitutional values by the judicial system has had far-reaching impact, often even altering provisions of the Constitution itself. Although our legal system was originally based on the broad principles of the English common law, over the years it has been adapted to Indian traditions and been changed, for the better, by certain landmark verdicts.In Landmark Judgments that Changed India, former Supreme Court judge and eminent jurist Asok Kumar Ganguly analyses certain cases that led to the formation of new laws and changes to the legal system. Discussed in this book are judgments in cases such as Kesavananda Bharati v. State of Kerala that curtailed the power of Parliament to amend the Constitution; Maneka Gandhi v. Union of India and Others that defined personal liberty; and Golaknath v. State of Punjab, where it was ruled that amendments which infringe upon fundamental rights cannot be passed.Of special significance for law students and practitioners, this book is also an ideal guide for anyone interested in the changes made to Indian laws down the years, and the evolution of the judicial system to what it is today.

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Why Me? The Very Important Emails of Bob Servant


Neil Forsyth - 2011
    The economy is collapsing, his health is failing, and around his hometown of Broughty Ferry, Bob is struggling to get the respect he deserves. Fortunately his email junk folder is bursting with offers of assistance from around the world. In these genuine emails, Bob Servant looks to the Internet's worst con merchants and charlatans for answers to his many woes. The author of the bestselling Delete This At Your Peril and the critically acclaimed Radio 4 series The Bob Servant Emails is back with an all-new compilation of emails targeting a fresh batch of email spammers—the false lenders who have bravely stepped into the credit crunch, supposed doctors offering expensive treatments for Bob's ailments, and fake foreign soldiers offering him military advice in his campaign against a local bowling club. They all find a man from Broughty Ferry who is ready and willing to give them his valuable time.

RAW: A History of India's Covert Operations


Yatish Yadav - 2020
    

The Edge of Disaster: Rebuilding a Resilient Nation


Stephen Flynn - 2007
    We have learned little from the cataclysms of September 11 and Hurricane Katrina. When it comes to catastrophe, America is living on borrowed time-and squandering it. In this new book, leading security expert Stephen Flynn issues a call to action, demanding that we wake up and prepare immediately for a safer future. The truth is acts of terror cannot always be prevented, and nature continues to show its fury in frighteningly unpredictable ways. Resiliency, argues Flynn, must now become our national motto. With chilling frankness and clarity, Flynn paints an all too real scenario of the threats we face within our own borders. A terrorist attack on a tanker carrying liquefied natural gas into Boston Harbor could kill thousands and leave millions more of New Englanders without power or heat. The destruction of a ship with a cargo of oil in Long Beach, California, could bring the West Coast economy to its knees and endanger the surrounding population. But even these all-too-plausible terrorist scenarios pale in comparison to the potential destruction wrought by a major earthquake or hurricane. Our growing exposure to man-made and natural perils is largely rooted in our own negligence, as we take for granted the infrastructure handed down to us by earlier generations. Once the envy of the world, this infrastructure is now crumbling. After decades of neglect, our public health system leaves us at the mercy of microbes that could kill millions in the next flu pandemic. Flash flooding could wipe out a fifty-year-old dam north of Phoenix, placing thousands of homes and lives at risk. The next San Francisco earthquake could destroy century-old levees, contaminating the freshwater supply that most of California relies on for survival. It doesn't have to be this way. "The Edge of Disaster "tells us what we can do about it, as individuals and as a society. We can-and, Flynn argues, we must-construct a more resilient nation. With the wounds of recent national tragedies still unhealed, the time to act is now. Flynn argues that by tackling head-on, eyes open the perils that lie before us, we can remain true to our most important and endearing national trait: our sense of optimism about the future and our conviction that we can change it for the better for ourselves-and our children. "Steve Flynn offers the answer not only to protecting America from terrorist attacks and natural disaster but also to revitalizing our democracy. This book is a must-read for all members of Congress, 2008 presidential candidates, and ordinary citizens who want to build a better and safer future."-Anne-Marie Slaughter, dean, Woodrow Wilson School of Public and International Affairs, Princeton University Advance praise for "The Edge of Disaster" "Steve Flynn has done it again. Like America the Vulnerable before it, "The Edge of Disaster" is the must-read book for every American, elected official, and presidential candidate who is committed to ensuring that our nation continue to thrive in perilous times."-Mark Warner, former governor of Virginia "Since 9/11, protecting our nation against a terrorist attack has consumed policy makers in Washington. What Stephen Flynn points out in The Edge of Disaster is that much of this effort has been directed overseas, often at the expense of our homeland and its much more likely areas of vulnerability. Laying out a series of potential disasters both manmade and natural, Flynn calls for a greater emphasis on preparedness and the ability of communities and the nation to recover. Painting an often frustrating and infuriating picture of missed opportunities, "The Edge of Disaster "is a call to action. The time to act is now. We can only hope that policy makers are listening." -Christine Todd Whitman, former governor of New Jersey and former administrator, Environmental Protection Agency (2001-03) "Steve Flynn's book makes the very persuasive argument that national security preparedness is linked to natural disaster preparedness. By investing significantly in our critical infrastructure, in citizen preparedness, and most importantly in leadership, we can be better prepared for all hazards. A great book that I highly recommend." -James Lee Witt, former director, Federal Emergency Management Agency "Steve Flynn has become a relentless contributor to the dialogue on prioritizing the work of the post-9/11 security environment. "The Edge of Disaster" calls into question the neglect of domestic preparedness in favor of the Department of Defense-driven offensive in the global war on terrorism. The book offers provocative challenges to both our elected and our private-sector leaders, and both should read it thoroughly." -Admiral James M. Loy, former commandant, U.S. Coast Guard, and former deputy secretary of homeland security

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Creating Mobile Apps with Xamarin.Forms: Cross-Platform C# Programming for iOS, Android, and Windows Phone


Charles Petzold - 2014
    Xamarin.Forms lets you write shared user-interface code in C# and XAML that maps to native controls on these three platforms.