Book picks similar to
The Internet Police: How Crime Went Online, and the Cops Followed by Nate Anderson
non-fiction
technology
society
crime
The Soul of a New Machine
Tracy Kidder - 1981
Tracy Kidder got a preview of this world in the late 1970s when he observed the engineers of Data General design and build a new 32-bit minicomputer in just one year. His thoughtful, prescient book, The Soul of a New Machine, tells stories of 35-year-old "veteran" engineers hiring recent college graduates and encouraging them to work harder and faster on complex and difficult projects, exploiting the youngsters' ignorance of normal scheduling processes while engendering a new kind of work ethic.These days, we are used to the "total commitment" philosophy of managing technical creation, but Kidder was surprised and even a little alarmed at the obsessions and compulsions he found. From in-house political struggles to workers being permitted to tease management to marathon 24-hour work sessions, The Soul of a New Machine explores concepts that already seem familiar, even old-hat, less than 20 years later. Kidder plainly admires his subjects; while he admits to hopeless confusion about their work, he finds their dedication heroic. The reader wonders, though, what will become of it all, now and in the future. —Rob Lightner
The Killer of Little Shepherds: A True Crime Story and the Birth of Forensic Science
Douglas Starr - 2010
At the end of the nineteenth century, serial murderer Joseph Vacher, known and feared as "The Killer of Little Shepherds," terrorized the French countryside. He eluded authorities for years--until he ran up against prosecutor Emile Fourquet and Dr. Alexandre Lacassagne, the era's most renowned criminologist. The two men--intelligent and bold--typified the Belle Epoque, a period of immense scientific achievement and fascination with science's promise to reveal the secrets of the human condition. With high drama and stunning detail, Douglas Starr revisits Vacher's infamous crime wave, interweaving the story of how Lacassagne and his colleagues were developing forensic science as we know it. We see one of the earliest uses of criminal profiling, as Fourquet painstakingly collects eyewitness accounts and constructs a map of Vacher's crimes. We follow the tense and exciting events leading to the murderer's arrest. And we witness the twists and turns of the trial, celebrated in its day. In an attempt to disprove Vacher's defense by reason of insanity, Fourquet recruits Lacassagne, who in the previous decades had revolutionized criminal science by refining the use of blood-spatter evidence, systematizing the autopsy, and doing groundbreaking research in psychology. Lacassagne's efforts lead to a gripping courtroom denouement. "The Killer of Little Shepherds" is an important contribution to the history of criminal justice, impressively researched and thrillingly told.
Dreamland: The True Tale of America's Opiate Epidemic
Sam Quinones - 2015
Communities where heroin had never been seen before—from Charlotte, NC and Huntington, WVA, to Salt Lake City and Portland, OR—were overrun with it. Local police and residents were stunned. How could heroin, long considered a drug found only in the dense, urban environments along the East Coast, and trafficked into the United States by enormous Colombian drug cartels, be so incredibly ubiquitous in the American heartland? Who was bringing it here, and perhaps more importantly, why were so many townspeople suddenly eager for the comparatively cheap high it offered?With the same dramatic drive of El Narco and Methland, Sam Quinones weaves together two classic tales of American capitalism: The stories of young men in Mexico, independent of the drug cartels, in search of their own American Dream via the fast and enormous profits of trafficking cheap black-tar heroin to America’s rural and suburban addicts; and that of Purdue Pharma in Stamford, Connecticut, determined to corner the market on pain with its new and expensive miracle drug, Oxycontin; extremely addictive in its own right. Quinones illuminates just how these two stories fit together as cause and effect: hooked on costly Oxycontin, American addicts were lured to much cheaper black tar heroin and its powerful and dangerous long-lasting high. Embroiled alongside the suppliers and buyers are DEA agents, local, small-town sheriffs, and the US attorney from eastern Virginia whose case against Purdue Pharma and Oxycontin made him an enemy of the Bush-era Justice Department, ultimately stalling and destroying his career in public service.Dreamland is a scathing and incendiary account of drug culture and addiction spreading to every part of the American landscape.
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Artificial Intelligence: A Guide for Thinking Humans
Melanie Mitchell - 2019
The award-winning author Melanie Mitchell, a leading computer scientist, now reveals AI’s turbulent history and the recent spate of apparent successes, grand hopes, and emerging fears surrounding it.In Artificial Intelligence, Mitchell turns to the most urgent questions concerning AI today: How intelligent—really—are the best AI programs? How do they work? What can they actually do, and when do they fail? How humanlike do we expect them to become, and how soon do we need to worry about them surpassing us? Along the way, she introduces the dominant models of modern AI and machine learning, describing cutting-edge AI programs, their human inventors, and the historical lines of thought underpinning recent achievements. She meets with fellow experts such as Douglas Hofstadter, the cognitive scientist and Pulitzer Prize–winning author of the modern classic Gödel, Escher, Bach, who explains why he is “terrified” about the future of AI. She explores the profound disconnect between the hype and the actual achievements in AI, providing a clear sense of what the field has accomplished and how much further it has to go.Interweaving stories about the science of AI and the people behind it, Artificial Intelligence brims with clear-sighted, captivating, and accessible accounts of the most interesting and provocative modern work in the field, flavored with Mitchell’s humor and personal observations. This frank, lively book is an indispensable guide to understanding today’s AI, its quest for “human-level” intelligence, and its impact on the future for us all.
How to Disappear: Erase your Digital Footprint, Leave False Trails, and Vanish without A Trace
Frank M. Ahearn - 2010
How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence.
The Fourth Industrial Revolution
Klaus Schwab - 2016
Characterized by a range of new technologies that are fusing the physical, digital and biological worlds, the developments are affecting all disciplines, economies, industries and governments, and even challenging ideas about what it means to be human.Artificial intelligence is already all around us, from supercomputers, drones and virtual assistants to 3D printing, DNA sequencing, smart thermostats, wearable sensors and microchips smaller than a grain of sand. But this is just the beginning: nanomaterials 200 times stronger than steel and a million times thinner than a strand of hair and the first transplant of a 3D printed liver are already in development. Imagine “smart factories” in which global systems of manufacturing are coordinated virtually, or implantable mobile phones made of biosynthetic materials.The fourth industrial revolution, says Schwab, is more significant, and its ramifications more profound, than in any prior period of human history. He outlines the key technologies driving this revolution and discusses the major impacts expected on government, business, civil society and individuals. Schwab also offers bold ideas on how to harness these changes and shape a better future—one in which technology empowers people rather than replaces them; progress serves society rather than disrupts it; and in which innovators respect moral and ethical boundaries rather than cross them. We all have the opportunity to contribute to developing new frameworks that advance progress.
Charged: Overzealous Prosecutors, the Quest for Mercy, and the Fight to Transform Criminal Justice in America
Emily Bazelon - 2019
But in practice, it is prosecutors who have the upper hand, in a contest that is far from equal. More than anyone else, prosecutors decide who goes free and who goes to prison, and even who lives and who dies. The system wasn't designed for this kind of unchecked power, and in Charged, Emily Bazelon shows that it is an underreported cause of enormous injustice—and the missing piece in the mass incarceration puzzle.But that's only half the story. Prosecution in America is at a crossroads. The power of prosecutors makes them the actors in the system—the only actors—who can fix what's broken without changing a single law. They can end mass incarceration, protect against coercive plea bargains and convicting the innocent, and tackle racial bias. And because in almost every state we, the people, elect prosecutors, it is within our power to reshape the choices they make. In the last few years, for the first time in American history, a wave of reform-minded prosecutors has taken office in major cities throughout the country. Bazelon follows them, showing the difference they make for people caught in the system and how they are coming together as a new kind of lobby for justice and mercy.In Charged, Emily Bazelon mounts a major critique of the American criminal justice system—and also offers a way out.
The Internet of Money
Andreas M. Antonopoulos - 2016
Acclaimed information-security expert and author of Mastering Bitcoin, Andreas M. Antonopoulos examines and contextualizes the significance of bitcoin through a series of essays spanning the exhilarating maturation of this technology. Bitcoin, a technological breakthrough quietly introduced to the world in 2008, is transforming much more than finance. Bitcoin is disrupting antiquated industries to bring financial independence to billions worldwide. In this book, Andreas explains why bitcoin is a financial and technological evolution with potential far exceeding the label “digital currency.” Andreas goes beyond exploring the technical functioning of the bitcoin network by illuminating bitcoin’s philosophical, social, and historical implications. As the internet has essentially transformed how people around the world interact and has permanently impacted our lives in ways we never could have imagined, bitcoin -- the internet of money -- is fundamentally changing our approach to solving social, political, and economic problems through decentralized technology.
Missoula: Rape and the Justice System in a College Town
Jon Krakauer - 2015
Missoula, Montana, is a typical college town, with a highly regarded state university, bucolic surroundings, a lively social scene, and an excellent football team — the Grizzlies — with a rabid fan base. The Department of Justice investigated 350 sexual assaults reported to the Missoula police between January 2008 and May 2012. Few of these assaults were properly handled by either the university or local authorities. In this, Missoula is also typical. A DOJ report released in December of 2014 estimates 110,000 women between the ages of eighteen and twenty-four are raped each year. Krakauer’s devastating narrative of what happened in Missoula makes clear why rape is so prevalent on American campuses, and why rape victims are so reluctant to report assault. Acquaintance rape is a crime like no other. Unlike burglary or embezzlement or any other felony, the victim often comes under more suspicion than the alleged perpetrator. This is especially true if the victim is sexually active; if she had been drinking prior to the assault — and if the man she accuses plays on a popular sports team. The vanishingly small but highly publicized incidents of false accusations are often used to dismiss her claims in the press. If the case goes to trial, the woman’s entire personal life becomes fair game for defense attorneys. This brutal reality goes a long way towards explaining why acquaintance rape is the most underreported crime in America. In addition to physical trauma, its victims often suffer devastating psychological damage that leads to feelings of shame, emotional paralysis and stigmatization. PTSD rates for rape victims are estimated to be 50%, higher than soldiers returning from war. In Missoula, Krakauer chronicles the searing experiences of several women in Missoula — the nights when they were raped; their fear and self-doubt in the aftermath; the way they were treated by the police, prosecutors, defense attorneys; the public vilification and private anguish; their bravery in pushing forward and what it cost them. Some of them went to the police. Some declined to go to the police, or to press charges, but sought redress from the university, which has its own, non-criminal judicial process when a student is accused of rape. In two cases the police agreed to press charges and the district attorney agreed to prosecute. One case led to a conviction; one to an acquittal. Those women courageous enough to press charges or to speak publicly about their experiences were attacked in the media, on Grizzly football fan sites, and/or to their faces. The university expelled three of the accused rapists, but one was reinstated by state officials in a secret proceeding. One district attorney testified for an alleged rapist at his university hearing. She later left the prosecutor’s office and successfully defended the Grizzlies’ star quarterback in his rape trial. The horror of being raped, in each woman’s case, was magnified by the mechanics of the justice system and the reaction of the community. Krakauer’s dispassionate, carefully documented account of what these women endured cuts through the abstract ideological debate about campus rape. College-age women are not raped because they are promiscuous, or drunk, or send mixed signals, or feel guilty about casual sex, or seek attention. They are the victims of a terrible crime and deserving of compassion from society and fairness from a justice system that is clearly broken.
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis - 2005
I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson - 2010
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Zero Day: The Threat In Cyberspace
Robert O'Harrow Jr. - 2013
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.
Nobody's Victim: Fighting Psychos, Stalkers, Pervs, and Trolls
Carrie Goldberg - 2019
“We are all a moment away from having our life overtaken by somebody hell-bent on our destruction.” That grim reality—gleaned from personal experience and twenty years of trauma work—is a fundamental principle of Carrie Goldberg's cutting-edge victims' rights law firm.Riveting and an essential timely conversation-starter, Nobody's Victim invites readers to join Goldberg on the front lines of the war against sexual violence and privacy violations as she fights for revenge porn and sextortion laws; uncovers major Title IX violations; and sues the hell out of tech companies, schools, and powerful sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors.In gripping detail, Goldberg shares the diabolical ways her clients are attacked and how she, through her unique combination of advocacy, badass relentlessness, risk-taking, and client-empowerment, pursues justice for them all. There are stories about a woman whose ex-boyfriend made fake bomb threats in her name and caused a national panic; a fifteen-year-old girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and a man whose ex-boyfriend used a dating app to send more than 1,200 men to ex's home and work for sex. With breathtaking honesty, Goldberg also shares her own shattering story about why she began her work and the uphill battle of building a business.While her clients are a diverse group—from every gender, sexual orientation, age, class, race, religion, occupation, and background—the offenders are not. They are highly predictable. Goldberg offers a taxonomy of the four types of offenders she encounters most often at her firm: assholes, psychos, pervs, and trolls. “If we recognize the patterns of these perpetrators,” she explains, “we know how to fight back.”Deeply personal yet achingly universal, Nobody's Victim is a bold and much-needed analysis of victim protection in the internet era. It is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves—both online and off.