The Dark Net: Inside the Digital Underworld


Jamie Bartlett - 2014
    A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System


Bill Blunden - 2009
    Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0

Supermob: How Sidney Korshak and His Criminal Associates Became America's Hidden Power Brokers


Gus Russo - 2006
    Presenting startling, never-before-seen revelations about such famous members as Jules Stein, Joe Glaser, Ronald Reagan, Lew Wasserman, David Bazelon & John Jacob Factor--as well as infamous, scrupulously low-profile members--Russo pulls the lid off of a half-century of criminal infiltration into American business, politics & society. At the heart of it is Sidney "The Fixer" Korshak, who from the 1940's until his death in the '90s, wasn't only the most powerful lawyer in the world, according to the FBI, but the enigmatic player behind countless 20th century power mergers, political deals & organized crime chicaneries. As the underworld's primary link to the corporate upperworld, his backroom dominance & talent for anonymity will likely never be equaled. As Supermob proves, neither will his story.Cast of charactersPrefaceThe lawyer from LawndaleFrom Lawndale to the Seneca to the underworldBirds of a feather Kaddish for CaliforniaThe future is in real estate"Hell, that's what you had to do in those days to get by"Scenes from Hollywood, part 1Jimmy, Bobby & SidneyForty years in the desert The kingmakers: Paul, Lew & Ronnie in CaliforniaThe new frontier Bistro days "He could never walk away from those people"Scenes from Hollywood, part 2"A sunny place for shady people"Coming under attack From Hoffa to HollywoodFrom Dutch sandwiches to Dutch ReaganAiring dirty laundry & laundering dirty money Pursued by the Fourth Estate The true untouchablesLegacies Appendices: A-Supermob investments/B-Pritzker holdings/C-Ziffren-Greenberg-Genis documentsNotesBibliographyIndex

How We Lead: Canada in a Century of Change


Joe Clark - 2013
    In the world that is taking shape, the unique combination of Canada's success at home as a diverse society and its reputation internationally as a sympathetic and respected partner consititute national assets that are at least as valuable as its natural resource wealth. As the world becomes more competitive and complex, and the chances of deadly conflict grow, the example and the initiative of Canada can become more important than they have ever been. That depends on its people: assets have no value if Canadians don't recognize or use them, or worse, if they waste them. A more effective Canada is not only a benefit to itself, but to its friends and neighbours. And in this compelling examination of what it as a nation has been, what it has become and what it can yet be to the world, Joe Clark takes the reader beyond formal foreign policy and looks at the contributions and leadership offered by Canada's most successful individuals and organizations who are already putting these uniquely Canadian assets to work internationally.

Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer


William R. Johnson - 1987
    CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

How Obama Betrayed America....And No One Is Holding Him Accountable


David Horowitz - 2013
    is so guilty for past transgressions that it deserves to be chastened on the world stage. As David Horowitz shows in this no holds barred pamphlet, minimizing the Islamist threat to the United States is not an oversight of the Obama administration; it is policy. The most dangerous Islamist regime, Iran, is being allowed to acquire nuclear weapons while Washington dithers over pointless negotiations and stands by as the mullahs fill the vacuum in Iraq created by the withdrawal of all American forces, against the advice of the Joint Chiefs of Staff. In Afghanistan, supposedly the "good war," victory is not an option; the Taliban licks its chops and waits for American troops to leave in ignominy. Meanwhile, this White House has facilitated the rise of the Muslim Brotherhood throughout the Middle East, helping it come to power in Cairo, bankrolling it and giving it F-16s that are likely someday to be used against Israel, and displayed weakness in Syria by ignoring "red lines" it said would never be crossed. It is a low point for America, as David Horowitz shows, with Republicans, traditionally the party of strong national security, offering only an echo, not a choice in American foreign policy, watching in a state of policy paralysis as Obama appeases our enemies and enables their evil ambitions.

The Locust Effect: Why the End of Poverty Requires the End of Violence


Gary A. Haugen - 2013
    Few of us think of violence. But beneath the surface of the poorest communities in the developing world is a hidden epidemic of everyday violence-of rape, forced labor, illegal detention, land theft, police abuse, and more- that is undermining our best efforts to assist the poor. Gary Haugen and Victor Boutros's The Locust Effect offers a searing account of the way pervasive violence blocks the road out of poverty, undermines economic development, and reduces the effectiveness of international public health efforts. As corrupt and dysfunctional justice systems allow the locusts of predatory violence to descend upon the poor, the ravaging plague lays waste to programs of income generation, disease prevention, education for girls and other assistance to the poor. And tragically, none of these aid programs can stop the violence. In graphic real-world stories-set in locales ranging from Peru to India to Nigeria- The Locust Effect offers a gripping journey into the vast, hidden underworld of everyday violence where justice is only available to those with money. But the book holds out hope, recalling that justice systems in developed countries were once just as corrupt and brutal; and explores a practical path for throwing off antiquated colonial justice systems and re-engineering the administration of justice to protect the poorest. Sweeping in scope and filled with unforgettable stories, The Locust Effect will force us to rethink everything we know about the causes of poverty and what it will take make the poor safe enough to prosper.

Orwell on Truth


George Orwell - 2017
    With an introduction by Alan Johnson. 'Freedom is the freedom to say that two plus two equals four. If that is granted, all else follows.' This selection of George Orwell’s writing, from both his novels and non-fiction, gathers together his thoughts on the subject of truth. It ranges from discussion of personal honesty and morality, to freedom of speech and political propaganda. Orwell’s unique clarity of thought and illuminating scepticism provide the perfect defence against our post-truth world of fake news and confusion. 'The further a society drifts from the truth, the more it will hate those that speak it.' Includes an introduction by Alan Johnson and passages from Burmese Days, The Road to Wigan Pier, Coming Up for Air, The Lion and the Unicorn, Animal Farm, Nineteen Eighty-Four, Orwell’s letters, war-time diary, criticism and essays including ‘Fascism and Democracy’, ‘Culture and Democracy’, ‘Looking Back on the Spanish War’, ‘As I Please’, ‘Notes on Nationalism’, ‘The Prevention of Literature’, ‘Politics and the English Language’ and ‘Why I Write’.

The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency


Annie Jacobsen - 2015
    In the first-ever history about the organization, New York Times bestselling author Annie Jacobsen draws on inside sources, exclusive interviews, private documents, and declassified memos to paint a picture of DARPA, or "the Pentagon's brain," from its Cold War inception in 1958 to the present.This is the book on DARPA--a compelling narrative about this clandestine intersection of science and the American military and the often frightening results.

Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin's Spies


Gordon Corera - 2020
    It was the culmination of a decade-long investigation, and ten people, including Anna Chapman, were swapped for four people held in Russia. At the time it was seen simply as a throwback to the Cold War. But that would prove to be a costly mistake. It was a sign that the Russian threat had never gone away and more importantly, it was shifting into a much more disruptive new phase. Today, the danger is clearer than ever following the poisoning in the UK of one of the spies who was swapped, Sergei Skripal, and the growing evidence of Russian interference in American life.Russians Among Us describes for the first time the story of deep cover spies in America and the FBI agents who tracked them. In intimate and riveting detail, it reveals new information about today’s spies—as well as those trying to catch them and those trying to kill them.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Conspiracy: Peter Thiel, Hulk Hogan, Gawker, and the Anatomy of Intrigue


Ryan Holiday - 2018
    Thiel's sexuality had been known to close friends and family, but he didn't consider himself a public figure, and believed the information was private. This post would be the casus belli for a meticulously plotted conspiracy that would end nearly a decade later with a $140 million dollar judgment against Gawker, its bankruptcy and with Nick Denton, Gawker's CEO and founder, out of a job. Only later would the world learn that Gawker's demise was not incidental--it had been masterminded by Thiel.For years, Thiel had searched endlessly for a solution to what he'd come to call the "Gawker Problem." When an unmarked envelope delivered an illegally recorded sex tape of Hogan with his best friend's wife, Gawker had seen the chance for millions of pageviews and to say the things that others were afraid to say. Thiel saw their publication of the tape as the opportunity he was looking for. He would come to pit Hogan against Gawker in a multi-year proxy war through the Florida legal system, while Gawker remained confidently convinced they would prevail as they had over so many other lawsuit--until it was too late. The verdict would stun the world and so would Peter's ultimate unmasking as the man who had set it all in motion. Why had he done this? How had no one discovered it? What would this mean--for the First Amendment? For privacy? For culture?In Holiday's masterful telling of this nearly unbelievable conspiracy, informed by interviews with all the key players, this case transcends the narrative of how one billionaire took down a media empire or the current state of the free press. It's a study in power, strategy, and one of the most wildly ambitious--and successful--secret plots in recent memory.Some will cheer Gawker's destruction and others will lament it, but after reading these pages--and seeing the access the author was given--no one will deny that there is something ruthless and brilliant about Peter Thiel's shocking attempt to shake up the world.

Golden Gates: Fighting for Housing in America


Conor Dougherty - 2020
    Today, however, punishing rents and the increasingly prohibitive cost of ownership have turned housing into the foremost symbol of inequality and an economy gone wrong. Nowhere is this more visible than in the San Francisco Bay Area, where fleets of private buses ferry software engineers past the tarp-and-plywood shanties where the homeless make their homes. The adage that California is a glimpse of the nation's future has become a cautionary tale.With propulsive storytelling and ground-level reporting, New York Times journalist Conor Dougherty chronicles America's housing crisis from its West Coast epicenter, peeling back the decades of history and economic forces that brought us here and taking readers inside the activist uprisings that have risen in tandem with housing costs. To tell this new story of housing, Dougherty follows a struggling math teacher who builds a political movement dedicated to ending single-family-house neighborhoods. A teenaged girl who leads her apartment complex against their rent-raising landlord. A nun who tries to outmaneuver private equity investors by amassing a multimillion-dollar portfolio of affordable homes. A suburban bureaucrat who roguishly embraces density in response to the threat of climate change. A developer who manufactures homeless housing on an assembly line.Sweeping in scope and intimate in detail, Golden Gates definitively captures a fundamental political realignment in America as it plays out during a moment of rapid technological and social change.