Cyberspies The Secret History of Surveillance Hacking and Digital Espionage

Author: Gordon Corera
Publisher: Pegasus Books
ISBN: 9781681771946
Release Date: 2016-07-05
Genre: History

The previously untold—and previously highly classified—story of the conflux of espionage and technology, with a compelling narrative rich with astonishing revelations taking readers from World War II to the internet age. As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera’s compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes. Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

Cyberspies

Author: Gordon Corera
Publisher:
ISBN: 1681774593
Release Date: 2017-08-15
Genre: Computers

The previously untold and previously highly classified story of the conflux of espionage and technology, with a compelling narrative rich with astonishing revelations taking readers from World War II to the internet age."

Intercept

Author: Gordon Corera
Publisher:
ISBN: 1780227841
Release Date: 2016-06-09
Genre:


The Shadow Factory

Author: James Bamford
Publisher: Anchor
ISBN: 9780385528399
Release Date: 2008-10-14
Genre: Political Science

James Bamford has been the preeminent expert on the National Security Agency since his reporting revealed the agency’s existence in the 1980s. Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public. The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here. From the Trade Paperback edition.

Countdown to Zero Day

Author: Kim Zetter
Publisher: Crown
ISBN: 9780770436186
Release Date: 2014-11-11
Genre: History

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

Code Warriors

Author: Stephen Budiansky
Publisher: Knopf
ISBN: 9780385352666
Release Date: 2016
Genre: History

A sweeping, in-depth history of NSA, whose famous "cult of silence" has left the agency shrouded in mystery for decades The National Security Agency was born out of the legendary codebreaking programs of World War II that cracked the famed Enigma machine and other German and Japanese codes, thereby turning the tide of Allied victory. In the postwar years, as the United States developed a new enemy in the Soviet Union, our intelligence community found itself targeting not soldiers on the battlefield, but suspected spies, foreign leaders, and even American citizens. Throughout the second half of the twentieth century, NSA played a vital, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. In Code Warriors, Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how NSA came to be, from its roots in World War II through the fall of the Berlin Wall. Along the way, he guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. With access to new documents, Budiansky shows where the agency succeeded and failed during the Cold War, but his account also offers crucial perspective for assessing NSA today in the wake of the Edward Snowden revelations. Budiansky shows how NSA's obsession with recording every bit of data and decoding every signal is far from a new development; throughout its history the depth and breadth of the agency's reach has resulted in both remarkable successes and destructive failures. Featuring a series of appendixes that explain the technical details of Soviet codes and how they were broken, this is a rich and riveting history of the underbelly of the Cold War, and an essential and timely read for all who seek to understand the origins of the modern NSA.

The Hacked World Order

Author: Adam Segal
Publisher: PublicAffairs
ISBN: 9781610394161
Release Date: 2016-02-23
Genre: Political Science

In this updated edition of The Hacked World Order, cybersecurity expert Adam Segal offers unmatched insight into the new, opaque global conflict that is transforming geopolitics. For more than three hundred years, the world wrestled with conflicts between nation-states, which wielded military force, financial pressure, and diplomatic persuasion to create "world order." But in 2012, the involvement of the US and Israeli governments in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks, was revealed; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber warfare demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, Segal reveals, power has been well and truly hacked.

The Art of Betrayal

Author: Gordon Corera
Publisher: Open Road Media
ISBN: 9781453271599
Release Date: 2013-01-08
Genre: History

“A wide-ranging, thought-provoking, and highly readable history of Britain’s postwar Secret Intelligence Service, popularly known as MI6.” ―The Wall Street Journal From Berlin to the Congo, from Moscow to the back streets of London, these are the true stories of the agents on the front lines of British intelligence. And the truth is sometimes more remarkable than the spy novels of Ian Fleming or John le Carré. Gordon Corera provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. He tells the story of how the secret service has changed since the end of the World War II and, by focusing on the real people and the relationships that lie at the heart of espionage, illustrates the danger, the drama, the intrigue, and the moral ambiguities that come with working for British intelligence. From the defining period of the early Cold War through modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organization to its modern, no less controversial, incarnation. And some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied, and in some cases nearly died in service of the state. They range from the spymasters to the agents they controlled to their sworn enemies, and the result is a “fast-paced” examination that ranges “from the covert diplomacy of the Cold War to recent security concerns in Afghanistan and the Middle East” (The Times, London).

War

Author: Shane Harris
Publisher: Houghton Mifflin Harcourt
ISBN: 9780544251793
Release Date: 2014
Genre: Computers

An investigation into how the Pentagon, NSA, and other government agencies are uniting with corporations to fight in cyberspace, the next great theater of war.

America the Vulnerable

Author: Stephen Flynn
Publisher: Harper Collins
ISBN: 0061852937
Release Date: 2009-10-13
Genre: Political Science

In this powerful and urgently needed call to action, national security expert Stephen Flynn offers a startling portrait of the radical shortcomings in America's plan for homeland security. He describes a frightening scenario of what the next major terrorist attack might look like -- revealing the tragic loss of life and economic havoc it would leave in its wake, as well as the seismic political consequences it would have in Washington. Flynn also shows us how to prepare for such a disaster, outlining a bold yet practical plan for achieving security in a way that is safe and smart, effective and manageable. In this new world of heightened risk and fear, America the Vulnerable delivers a timely, forceful message that cannot be ignored.

Binary Bullets

Author: Fritz Allhoff
Publisher: Oxford University Press
ISBN: 9780190464172
Release Date: 2016-01-04
Genre: Political Science

Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain" of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.

The Art of Betrayal

Author: Gordon Corera
Publisher: Hachette UK
ISBN: 9780297861010
Release Date: 2011-08-11
Genre: History

The secret history of MI6 - from the Cold War to the present day. The British Secret Service has been cloaked in secrecy and shrouded in myth since it was created a hundred years ago. Our understanding of what it is to be a spy has been largely defined by the fictional worlds of James Bond and John le Carre. THE ART OF BETRAYAL provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. It tells the story of how the secret service has changed since the end of World War II and by focusing on the people and the relationships that lie at the heart of espionage, revealing the danger, the drama, the intrigue, the moral ambiguities and the occasional comedy that comes with working for British intelligence. From the defining period of the early Cold War through to the modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organisation to its modern, no less controversial, incarnation. Gordon Corera reveals the triumphs and disasters along the way. The grand dramas of the Cold War and after - the rise and fall of the Berlin Wall, the Cuban Missile Crisis, the 11 September 2001 attacks and the Iraq war - are the backdrop for the human stories of the individual spies whose stories form the centrepiece of the narrative. But some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied and in some cases nearly died in service of the state. They range from the spymasters to the agents they ran to their sworn enemies. Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars. And the truth is often more remarkable than the fiction.

America the Vulnerable

Author: Joel Brenner
Publisher: Penguin
ISBN: 9781101547830
Release Date: 2011-09-29
Genre: Political Science

Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World. A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals. Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems. Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more. Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that. The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives. In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

Under Surveillance

Author: Randolph Lewis
Publisher: University of Texas Press
ISBN: 9781477313817
Release Date: 2017-11-01
Genre: Social Science

Never before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, "stop and frisk" tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors—surveillance has become so ubiquitous that we take its presence for granted. While many types of surveillance are pitched as ways to make us safer, almost no one has examined the unintended consequences of living under constant scrutiny and how it changes the way we think and feel about the world. In Under Surveillance, Randolph Lewis offers a highly original look at the emotional, ethical, and aesthetic challenges of living with surveillance in America since 9/11. Taking a broad and humanistic approach, Lewis explores the growth of surveillance in surprising places, such as childhood and nature. He traces the rise of businesses designed to provide surveillance and security, including one that caters to the Bible Belt's houses of worship. And he peers into the dark side of playful surveillance, such as eBay's online guide to "Fun with Surveillance Gadgets." A worried but ultimately genial guide to this landscape, Lewis helps us see the hidden costs of living in a "control society" in which surveillance is deemed essential to governance and business alike. Written accessibly for a general audience, Under Surveillance prompts us to think deeply about what Lewis calls "the soft tissue damage" inflicted by the culture of surveillance.

We Are Anonymous

Author: Parmy Olson
Publisher: Little, Brown
ISBN: 9780316213530
Release Date: 2012-06-05
Genre: Political Science

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec. WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel. Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids? WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.