Book picks similar to
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Clifford Stoll
non-fiction
nonfiction
history
technology
Big Data: A Revolution That Will Transform How We Live, Work, and Think
Viktor Mayer-Schönberger - 2013
“Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.www.big-data-book.com
Surveillance Valley: The Rise of the Military-Digital Complex
Yasha Levine - 2018
This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.
An Officer and a Spy
Robert Harris - 2013
This is the story of the infamous Dreyfus affair told as a chillingly dark, hard-edged novel of conspiracy and espionage.
Paris in 1895. Alfred Dreyfus, a young Jewish officer, has just been convicted of treason, sentenced to life imprisonment at Devil’s Island, and stripped of his rank in front of a baying crowd of twenty-thousand. Among the witnesses to his humiliation is Georges Picquart, the ambitious, intellectual, recently promoted head of the counterespionage agency that “proved” Dreyfus had passed secrets to the Germans. At first, Picquart firmly believes in Dreyfus’s guilt. But it is not long after Dreyfus is delivered to his desolate prison that Picquart stumbles on information that leads him to suspect that there is still a spy at large in the French military. As evidence of the most malignant deceit mounts and spirals inexorably toward the uppermost levels of government, Picquart is compelled to question not only the case against Dreyfus but also his most deeply held beliefs about his country, and about himself. Bringing to life the scandal that mesmerized the world at the turn of the twentieth century, Robert Harris tells a tale of uncanny timeliness––a witch hunt, secret tribunals, out-of-control intelligence agencies, the fate of a whistle-blower--richly dramatized with the singular storytelling mastery that has marked all of his internationally best-selling novels.
The Stranger Beside Me: Ted Bundy: The Shocking Inside Story
Ann Rule - 1980
With a slow chill that intensifies with each heart-pounding page, Rule describes her dawning awareness that Ted Bundy, her sensitive coworker on a crisis hotline, was one of the most prolific serial killers in America. He would confess to killing at least thirty-six young women from coast to coast, and was eventually executed for three of those cases. Drawing from their correspondence that endured until shortly before Bundy's death, and striking a seamless balance between her deeply personal perspective and her role as a crime reporter on the hunt for a savage serial killer -- the brilliant and charismatic Bundy, the man she thought she knew -- Rule changed the course of true-crime literature with this unforgettable chronicle.
Daemon
Daniel Suarez - 2006
Thousands of autonomous computer programs, or daemons, make our networked world possible, running constantly in the background of our lives, trafficking e-mail, transferring money, and monitoring power grids. For the most part, daemons are benign, but the same can't always be said for the people who design them. Matthew Sobol was a legendary computer game designer—the architect behind half-a-dozen popular online games. His premature death depressed both gamers and his company's stock price. But Sobol's fans aren't the only ones to note his passing. When his obituary is posted online, a previously dormant daemon activates, initiating a chain of events intended to unravel the fabric of our hyper-efficient, interconnected world. With Sobol's secrets buried along with him, and as new layers of his daemon are unleashed at every turn, it's up to an unlikely alliance to decipher his intricate plans and wrest the world from the grasp of a nameless, faceless enemy—or learn to live in a society in which we are no longer in control. . . . Computer technology expert Daniel Suarez blends haunting high-tech realism with gripping suspense in an authentic, complex thriller in the tradition of Michael Crichton, Neal Stephenson, and William Gibson.
You Look Like a Thing and I Love You: How Artificial Intelligence Works and Why It's Making the World a Weirder Place
Janelle Shane - 2019
according to an artificial intelligence trained by scientist Janelle Shane, creator of the popular blog "AI Weirdness." She creates silly AIs that learn how to name paint colors, create the best recipes, and even flirt (badly) with humans--all to understand the technology that governs so much of our daily lives.We rely on AI every day for recommendations, for translations, and to put cat ears on our selfie videos. We also trust AI with matters of life and death, on the road and in our hospitals. But how smart is AI really, and how does it solve problems, understand humans, and even drive self-driving cars?Shane delivers the answers to every AI question you've ever asked, and some you definitely haven't--like, how can a computer design the perfect sandwich? What does robot-generated Harry Potter fan-fiction look like? And is the world's best Halloween costume really "Vampire Hog Bride"?In this smart, often hilarious introduction to the most interesting science of our time, Shane shows how these programs learn, fail, and adapt--and how they reflect the best and worst of humanity. You Look Like a Thing and I Love You is the perfect book for anyone curious about what the robots in our lives are thinking.
In Cold Blood
Truman Capote - 1965
There was no apparent motive for the crime, and there were almost no clues. As Truman Capote reconstructs the murder and the investigation that led to the capture, trial, and execution of the killers, he generates both mesmerizing suspense and astonishing empathy. At the center of his study are the amoral young killers Perry Smith and Dick Hickcock, who, vividly drawn by Capote, are shown to be reprehensible yet entirely and frighteningly human. In Cold Blood is a seminal work of modern prose, a remarkable synthesis of journalistic skill and powerfully evocative narrative.
Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath
Ted Koppel - 2015
Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.” And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid. The current Secretary of Homeland Security suggests keeping a battery-powered radio.In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.
The Unexpected Spy: From the CIA to the FBI, My Secret Life Taking Down Some of the World's Most Notorious Terrorists
Tracy Walder - 2020
In high-security, steel-walled rooms in Virginia, Walder watched al-Qaeda members with drones as President Bush looked over her shoulder and CIA Director George Tenet brought her donuts. She tracked chemical terrorists and searched the world for weapons of mass destruction. She created a chemical terror chart that someone in the White House altered to convey information she did not have or believe, leading to the Iraq invasion. Driven to stop terrorism, Walder debriefed terrorists - men who swore they’d never speak to a woman - until they gave her leads. She followed trails through North Africa, Europe, and the Middle East, shutting down multiple chemical attacks. Then Walder moved to the FBI, where she worked in counterintelligence. In a single year, she helped take down one of the most notorious foreign spies ever caught on American soil. Catching the bad guys wasn’t a problem in the FBI, but rampant sexism was. Walder left the FBI to teach young women, encouraging them to find a place in the FBI, CIA, State Department or the Senate - and thus change the world. Length: 8 hrs and 10 mins
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon - 2009
From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.
What Would Google Do?
Jeff Jarvis - 2009
By “reverse engineering the fastest growing company in the history of the world,” author Jeff Jarvis, proprietor of Buzzmachine.com, one of the Web’s most widely respected media blogs, offers indispensible strategies for solving the toughest new problems facing businesses today. With a new afterword from the author, What Would Google Do? is the business book that every leader or potential leader in every industry must read.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government
David Talbot - 2015
Drawing on revelatory new materials—including newly discovered U.S. government documents, U.S. and European intelligence sources, the personal correspondence and journals of Allen Dulles’s wife and mistress, and exclusive interviews with the children of prominent CIA officials—Talbot reveals the underside of one of America’s most powerful and influential figures.Dulles’s decade as the director of the CIA—which he used to further his public and private agendas—were dark times in American politics. Calling himself “the secretary of state of unfriendly countries,” Dulles saw himself as above the elected law, manipulating and subverting American presidents in the pursuit of his personal interests and those of the wealthy elite he counted as his friends and clients—colluding with Nazi-controlled cartels, German war criminals, and Mafiosi in the process. Targeting foreign leaders for assassination and overthrowing nationalist governments not in line with his political aims, Dulles employed those same tactics to further his goals at home, Talbot charges, offering shocking new evidence in the assassination of President John F. Kennedy.An exposé of American power that is as disturbing as it is timely, The Devil’s Chessboard is a provocative and gripping story of the rise of the national security state—and the battle for America’s soul.
Stealing the Network: How to Own a Continent
Ryan Russell - 2004
While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world