Book picks similar to
Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy
psychology
non-fiction
security
social-engineering
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Glenn Greenwald - 2014
That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.
Life Inc.: How the World Became a Corporation and How to Take it Back
Douglas Rushkoff - 2009
Indeed, as Rushkoff shows, most Americans have so willingly adopted the values of corporations that they’re no longer even aware of it.This fascinating journey, from the late Middle Ages to today, reveals the roots of our debacle. From the founding of the first chartered monopoly to the branding of the self; from the invention of central currency to the privatization of banking; from the birth of the modern, self-interested individual to his exploitation through the false ideal of the single-family home; from the Victorian Great Exhibition to the solipsism of MySpace–the corporation has infiltrated all aspects of our daily lives. Life Inc. exposes why we see our homes as investments rather than places to live, our 401(k) plans as the ultimate measure of success, and the Internet as just another place to do business.Most of all, Life Inc. shows how the current financial crisis is actually an opportunity to reverse this six-hundred-year-old trend and to begin to create, invest, and transact directly rather than outsource all this activity to institutions that exist solely for their own sakes. Corporatism didn’t evolve naturally. The landscape on which we are living–the operating system on which we are now running our social software–was invented by people, sold to us as a better way of life, supported by myths, and ultimately allowed to develop into a self-sustaining reality. It is a map that has replaced the territory. Rushkoff illuminates both how we’ve become disconnected from our world and how we can reconnect to our towns, to the value we can create, and, mostly, to one another. As the speculative economy collapses under its own weight, Life Inc. shows us how to build a real and human-scaled society to take its place.
The Hardware Hacker: Adventures in Making and Breaking Hardware
Andrew Huang - 2017
In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.
Never Be Lied to Again: How to Get the Truth in 5 Minutes or Less in Any Conversation or Situation
David J. Lieberman - 1998
Lieberman shows you how to stop the lies and uncover the truth-- in any conversation or situation. In a simple, user-friendly format, Dr. Lieberman gives you the tools to determine, with uncanny accuracy, if you are being lied to.Utilizing newly developed techniques in hypnosis and psycholinguistics, this book also shows you how to easily influence anyone to tell the truth-- within minutes. Use it in any situation, from casual conversation to in-depth interviews. Never Be Lied to Again is chock-full of colorful examples and engaging scenarios to help you keep from being taken advantage of and give you that extra edge. Use these groundbreaking techniques to take control of every personal and business situation...and never be lied to again.
On Killing: The Psychological Cost of Learning to Kill in War and Society
Dave Grossman - 1995
But armies have developed sophisticated ways of overcoming this instinctive aversion. And contemporary civilian society, particularly the media, replicates the army's conditioning techniques, and, according to Lt. Col. Dave Grossman's thesis, is responsible for our rising rate of murder among the young.Upon its initial publication, On Killing was hailed as a landmark study of the techniques the military uses to overcome the powerful reluctance to kill, of how killing affects soldiers, and of the societal implications of escalating violence. Now, Grossman has updated this classic work to include information on 21st-century military conflicts, recent trends in crime, suicide bombings, school shootings, and more. The result is a work certain to be relevant and important for decades to come.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details
The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
Jonathan Littman - 1997
Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.
What Every Body is Saying: An Ex-FBI Agent's Guide to Speed-Reading People
Joe Navarro - 2008
Is it?She says she agrees. Does she?The interview went great - or did it?He said he'd never do it again. But he did.Read this book and send your nonverbal intelligence soaring. Joe Navarro, a former FBI counterintelligence officer and a recognized expert on nonverbal behavior, explains how to "speed-read" people: decode sentiments and behaviors, avoid hidden pitfalls, and look for deceptive behaviors. You'll also learn how your body language can influence what your boss, family, friends, and strangers think of you. You will discover:The ancient survival instincts that drive body languageWhy the face is the least likely place to gauge a person's true feelingsWhat thumbs, feet, and eyelids reveal about moods and motivesThe most powerful behaviors that reveal our confidence and true sentimentsSimple nonverbals that instantly establish trustSimple nonverbals that instantly communicate authorityFilled with examples from Navarro's professional experience, this definitive book offers a powerful new way to navigate your world.
The New Digital Age: Reshaping the Future of People, Nations and Business
Eric Schmidt - 2013
And, the Director of Google Ideas, Jared Cohen, formerly an advisor to both Secretaries of State Condoleezza Rice and Hillary Clinton.Never before has the future been so vividly and transparently imagined. From technologies that will change lives (information systems that greatly increase productivity, safety and our quality of life, thought controlled motion technology that can revolutionize medical procedures, and near-perfect translation technology that allows us to have more diversified interactions) to our most important future considerations (curating our online identity and fighting those who would do harm with it) to the widespread political change that will transform the globe (through transformations in conflict, increasingly active and global citizenries, a new wave of cyber-terrorism and states operating simultaneously in the physical and virtual realms) to the ever present threats to our privacy and security, Schmidt and Cohen outline in great detail and scope all the promise and peril awaiting us in the coming decades.
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
It's Not All About Me: The Top Ten Techniques for Building Quick Rapport with Anyone
Robin Dreeke - 2011
Robin Dreeke uses his research and years of work in the field of interpersonal relations and behavior to help readers focus on building relationships with others in "It's Not All About Me: The Top Ten Techniques for Building Quick Rapport with Anyone". Dreeke has used the techniques listed in "It's Not All About Me" with skilled professionals within the law enforcement community as well as with sales professionals, educators and individuals across the country and world. He knows the information provided will apply to business professionals of all sectors, those just entering the workforce and those leading companies. "It's Not All About Me" offers readers a look into the human mind, explaining how it really works. From reading body language to massaging egos in order to learn more information, Dreeke provides techniques he's tested and mastered when it comes to building rapport with others. In some aspects, Dreeke's "It's Not All About Me" is about the individual and his wants, goals, desires and dreams. The 10 techniques covered in this guide will help readers achieve their goals by treating others well and placing communal wants and needs above individual ones. Dreeke believes the short and simple nature of his guide to building rapport makes the points easy to understand and adapt to one's life. ** Warning, the content of this book is so effective that the reader should think carefully about how it is used. Dreeke does not endorse or condone the malicious use of these skills. **
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
Gordon Corera - 2015
The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
How Would You Move Mount Fuji? Microsoft's Cult of the Puzzle--How the World's Smartest Companies Select the Most Creative Thinkers
William Poundstone - 2003
For the first time, William Poundstone reveals the toughest questions used at Microsoft and other Fortune 500 companies -- and supplies the answers. He traces the rise and controversial fall of employer-mandated IQ tests, the peculiar obsessions of Bill Gates (who plays jigsaw puzzles as a competitive sport), the sadistic mind games of Wall Street (which reportedly led one job seeker to smash a forty-third-story window), and the bizarre excesses of today's hiring managers (who may start off your interview with a box of Legos or a game of virtual Russian roulette). How Would You Move Mount Fuji? is an indispensable book for anyone in business. Managers seeking the most talented employees will learn to incorporate puzzle interviews in their search for the top candidates. Job seekers will discover how to tackle even the most brain-busting questions, and gain the advantage that could win the job of a lifetime. And anyone who has ever dreamed of going up against the best minds in business may discover that these puzzles are simply a lot of fun. Why are beer cans tapered on the end, anyway?
To Save Everything, Click Here: The Folly of Technological Solutionism
Evgeny Morozov - 2013
But how will these be affected once we delegate much of the responsibility for them to technology? The temptation of the digital age is to fix everything—from crime to corruption to pollution to obesity—by digitally quantifying, tracking, or gamifiying behavior. But when we change the motivations for our moral, ethical, and civic behavior, we may also change the very nature of that behavior itself. Technology, Evgeny Morozov proposes, can be a force for improvement—but only if we abandon the idea that it is necessarily revolutionary and instead genuinely interrogate what we are doing with it and what it is doing to us.From urging us to abandon monolithic ideas of “the Internet” to showing how to design more humane and democratic technological solutions, To Save Everything, Click Here is a dazzling tour of our technological future, and a searching investigation into the digital version of an enduring struggle: between man and his machines.