Corera’s compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.
Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
Gordon Corera is a Security Correspondent for BBC News. He has presented major documentaries for the BBC on cybersecurity, including Crypto Wars and Under Attack: Espionage, Sabotage, Subversin and Warfare in the Cyber Age. He is the author of The Art of Betrayal. He lives in London.
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.
Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.
The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.
In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.
The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.First book by world-renowned Black Hat, Inc. security consultants and trainersFirst book that details methods for attacking and defending physical security devicesBlack Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences
In this definitive biography—blessed by John le Carré himself—Adam Sisman reveals the man behind the bestselling persona. In John le Carré, Sisman shines a spotlight on David Cornwell, an expert at hiding in plain sight—“born to lying,” he wrote in 2002, “bred to it, trained to it by an industry that lies for a living, practiced in it as a novelist.”
Of course, the pseudonym “John le Carré” has helped to keep the public at a distance. Sisman probes Cornwell’s unusual upbringing, abandoned by his mother at the age of only five and raised by his con man father (when not in prison), and explores his background in British intelligence, as well as his struggle to become a writer, and his personal life. Sisman has benefited from unfettered access to le Carré’s private archive, talked to the most important people in his life, and interviewed the man himself at length.
Who is John le Carré? Intriguing, thorough, and packed with entertaining detail, this biography will be a treat for the legions of le Carré fans.
Between 1941 and 1944, British intelligence dropped sixteen thousand homing pigeons in an arc across Nazi-occupied Europe, from Bordeaux, France to Copenhagen, Denmark, as part of a spy operation code-named Columba. Returning to MI14, the secret government branch in charge of the "Special Pigeon Service," the birds carried messages that offered a glimpse of life under the Germans in rural France, Holland, and Belgium. Written on tiny pieces of rice paper tucked into canisters and tied to the birds’ legs, these messages were sometimes comic, often tragic, and occasionally invaluable—reporting details of German troop movements and fortifications, new Nazi weapons, radar systems, and even the deployment of the feared V-1 and V-2 rockets used to terrorize London.
The people who sent these messages were not trained spies. They were ordinary men and women willing to risk their lives in the name of freedom, including the "Leopold Vindictive" network—a small group of Belgian villagers led by an extraordinary priest named Joseph Raskin. The intelligence Raskin sent back by pigeon proved so valuable that it reached Churchill and MI6 parachuted agents behind enemy lines to assist him.
Gordon Corera uses declassified documents and extensive original research to tell the story of the Operation Columba and the Secret Pigeon Service for the first time. A powerful tale of wartime espionage, bitter rivalries, extraordinary courage, astonishing betrayal, harrowing tragedy, and a quirky, quarrelsome band of spy masters and their special mission, Operation Columba opens a fascinating new chapter in the annals of World War II. It is ultimately, the story of how, in one of the darkest and most dangerous times in history, under threat of death, people bravely chose to resist.