Book picks similar to
The Internet Police: How Crime Went Online, and the Cops Followed by Nate Anderson
non-fiction
technology
society
crime
Reefer Madness: Sex, Drugs, and Cheap Labor in the American Black Market
Eric Schlosser - 2003
In Reefer Madness the best-selling author of Fast Food Nation turns his exacting eye on the underbelly of the American marketplace and its far-reaching influence on our society. Exposing three American mainstays — pot, porn, and illegal immigrants — Eric Schlosser shows how the black market has burgeoned over the past several decades. He also draws compelling parallels between underground and overground: how tycoons and gangsters rise and fall, how new technology shapes a market, how government intervention can reinvigorate black markets as well as mainstream ones, and how big business learns — and profits — from the underground. Reefer Madness is a powerful investigation that illuminates the shadow economy and the culture that casts that shadow.(back cover)
I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy
Lori Andrews - 2012
Social networks are the defining cultural movement of our time. Over a half a billion people are on Facebook alone. If Facebook were a country, it would be the third largest nation in the world. But while that nation appears to be a comforting small town in which we can share photos of friends and quaint bits of trivia about our lives, it is actually a lawless battle zone—a frontier with all the hidden and unpredictable dangers of any previously unexplored place. Social networks offer freedom. An ordinary individual can be a reporter, alerting the world to breaking news of a natural disaster or a political crisis. A layperson can be a scientist, participating in a crowd-sourced research project. Or an investigator, helping cops solve a crime. But as we work and chat and date (and sometimes even have sex) over the web, traditional rights may be slipping away. Colleges and employers routinely reject applicants because of information found on social networks. Cops use photos from people’s profiles to charge them with crimes—or argue for harsher sentences. Robbers use postings about vacations to figure out when to break into homes. At one school, officials used cameras on students’ laptops to spy on them in their bedrooms. The same power of information that can topple governments can also topple a person’s career, marriage, or future. What Andrews proposes is a Constitution for the web, to extend our rights to this wild new frontier. This vitally important book will generate a storm of attention.
Accidental Empires
Robert X. Cringely - 1992
Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.
Privacy is Power: Reclaiming Democracy in the Digital Age
Carissa Véliz - 2020
Before you’ve even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your ‘suggested friends’ on Facebook, you continually compromise your privacy.Without your permission, or even your awareness, tech companies are harvesting your information, your location, your likes, your habits, and sharing it amongst themselves. They're not just selling your data. They’re selling the power to influence you. Even when you’ve explicitly asked them not to. And it's not just you. It's all your contacts too.Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power and democracy, we must protect our privacy.What can we do? So much is at stake. Our phones, our TVs, even our washing machines are spies in our own homes. We need new regulation. We need to pressure policy-makers for red lines on the data economy. And we need to stop sharing and to adopt privacy-friendly alternatives to Google, WhatsApp and other online platforms.Short, terrifying, practical: Privacy is Power highlights the implications of our laid-back attitudes to data, and sets out how we can reclaim control.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
The Four: The Hidden DNA of Amazon, Apple, Facebook, and Google
Scott Galloway - 2017
Just about everyone thinks they know how they got there. Just about everyone is wrong. For all that's been written about the Four over the last two decades, no one has captured their power and staggering success as insightfully as Scott Galloway.Instead of buying the myths these compa-nies broadcast, Galloway asks fundamental questions. How did the Four infiltrate our lives so completely that they're almost impossible to avoid (or boycott)? Why does the stock market forgive them for sins that would destroy other firms? And as they race to become the world's first trillion-dollar company, can anyone chal-lenge them?In the same irreverent style that has made him one of the world's most celebrated business professors, Galloway deconstructs the strategies of the Four that lurk beneath their shiny veneers. He shows how they manipulate the fundamental emotional needs that have driven us since our ancestors lived in caves, at a speed and scope others can't match. And he reveals how you can apply the lessons of their ascent to your own business or career.Whether you want to compete with them, do business with them, or simply live in the world they dominate, you need to understand the Four.
The Snowden Files: The Inside Story of the World's Most Wanted Man
Luke Harding - 2014
The consequences have shaken the leaders of nations worldwide. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop.From the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum, Snowden's story reads like a globe-trotting thriller.
Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World
Don Tapscott - 2016
But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.
The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order
Paul Vigna - 2015
A cyber-enigma with an enthusiastic following, it pops up in headlines and fuels endless media debate. You can apparently use it to buy anything from coffee to cars, yet few people seem to truly understand what it is. This raises the question: Why should anyone care about bitcoin?In The Age of Cryptocurrency, Wall Street journalists Paul Vigna and Michael J. Casey deliver the definitive answer to this question. Cybermoney is poised to launch a revolution, one that could reinvent traditional financial and social structures while bringing the world's billions of "unbanked" individuals into a new global economy. Cryptocurrency holds the promise of a financial system without a middleman, one owned by the people who use it and one safeguarded from the devastation of a 2008-type crash.But bitcoin, the most famous of the cybermonies, carries a reputation for instability, wild fluctuation, and illicit business; some fear it has the power to eliminate jobs and to upend the concept of a nation state. It implies, above all, monumental and wide-reaching change-for better and for worse. But it is here to stay, and you ignore it at your peril.Vigna and Casey demystify cryptocurrency-its origins, its function, and what you need to know to navigate a cyber-economy. The digital currency world will look very different from the paper currency world; The Age of Cryptocurrency will teach you how to be ready.
Hackers & Painters: Big Ideas from the Computer Age
Paul Graham - 2004
Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls “an intellectual Wild West.”The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us
Rachel Louise Snyder - 2019
Through the stories of victims, perpetrators, law enforcement, and reform movements from across the country, Snyder explores not only the dark corners of private violence, but also its far-reaching consequences for society, and what it will take to truly address it.
New Dark Age: Technology and the End of the Future
James Bridle - 2018
Underlying this trend is a single idea: the belief that our existence is understandable through computation, and more data is enough to help us build a better world. In actual fact, we are lost in a sea of information, increasingly divided by fundamentalism, simplistic narratives, conspiracy theories, and post-factual politics. Meanwhile, those in power use our lack of understanding to further their own interests. Despite the accessibility of information, we’re living in a new Dark Age. From rogue financial systems to shopping algorithms, from artificial intelligence to state secrecy, we no longer understand how our world is governed or presented to us. The media is filled with unverifiable speculation, much of it generated by anonymous software, while companies dominate their employees through surveillance and the threat of automation. In his brilliant new work, leading artist and writer James Bridle excavates the limits of technology and how it aids our understanding of the world. Surveying the history of art, technology, and information systems, he explores the dark clouds that gather over our dreams of the digital sublime.
Fentanyl, Inc.: How Rogue Chemists Are Creating the Deadliest Wave of the Opioid Epidemic
Ben Westhoff - 2019
is the first deep-dive investigation of a hazardous and illicit industry that has created a worldwide epidemic, ravaging communities and overwhelming and confounding government agencies that are challenged to combat it. "A whole new crop of chemicals is radically changing the recreational drug landscape," writes Ben Westhoff. "These are known as Novel Psychoactive Substances (NPS) and they include replacements for known drugs like heroin, cocaine, ecstasy, and marijuana. They are synthetic, made in a laboratory, and are much more potent than traditional drugs"--and all-too-often tragically lethal. Drugs like fentanyl, K2, and Spice--and those with arcane acronyms like 25i-NBOMe-- were all originally conceived in legitimate laboratories for proper scientific and medicinal purposes. Their formulas were then hijacked and manufactured by rogue chemists, largely in China, who change their molecular structures to stay ahead of the law, making the drugs' effects impossible to predict. Westhoff has infiltrated this shadowy world, becoming the first journalist to report from inside an illicit Chinese fentanyls lab and providing startling and original reporting on how China's vast chemical industry operates, and how the Chinese government subsidizes it. He tracks down the little-known scientists who invented these drugs and inadvertently killed thousands, as well as a mysterious drug baron who turned the law upside down in his home country of New Zealand. Poignantly, Westhoff chronicles the lives of addicted users and dealers, families of victims, law enforcement officers, and underground drug awareness organizers in the U.S. and Europe. Together they represent the shocking and riveting full anatomy of a calamity we are just beginning to understand. From its depths, as Westhoff relates, are emerging new strategies that may provide essential long-term solutions to the drug crisis that has affected so many.
Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption
Ben Mezrich - 2019
While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize “crypto” is, in their own words, "either the next big thing or total bulls--t." There’s nothing left to do but make a bet.From the Silk Road to the halls of the Securities and Exchange Commission, Bitcoin Billionaires will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here’s the story of how they got there—as only Ben Mezrich could tell it.