Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

Pegasus Books
Free sample

The previously untold—and previously highly classified—story of the conflux of espionage and technology, with a compelling narrative rich with astonishing revelations taking readers from World War II to the internet age. As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all.

Corera’s compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.

Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

Read more
Collapse

About the author

Gordon Corera is a Security Correspondent for BBC News. He has presented major documentaries for the BBC on cybersecurity, including Crypto Wars and Under Attack: Espionage, Sabotage, Subversin and Warfare in the Cyber Age. He is the author of The Art of Betrayal. He lives in London.

Read more
Collapse
Loading...

Additional Information

Publisher
Pegasus Books
Read more
Collapse
Published on
Jul 5, 2016
Read more
Collapse
Pages
448
Read more
Collapse
ISBN
9781681771946
Read more
Collapse
Read more
Collapse
Read more
Collapse
Language
English
Read more
Collapse
Genres
History / General
History / Military / Wars & Conflicts (Other)
Technology & Engineering / History
True Crime / Espionage
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Read Aloud
Available on Android devices
Read more
Collapse
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World.

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.

Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.

The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.

In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.

The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.

First book by world-renowned Black Hat, Inc. security consultants and trainersFirst book that details methods for attacking and defending physical security devicesBlack Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences
“A wide-ranging, thought-provoking, and highly readable history of Britain’s postwar Secret Intelligence Service, popularly known as MI6.” ―The Wall Street Journal

From Berlin to the Congo, from Moscow to the back streets of London, these are the true stories of the agents on the front lines of British intelligence. And the truth is sometimes more remarkable than the spy novels of Ian Fleming or John le Carré.
Gordon Corera provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. He tells the story of how the secret service has changed since the end of the World War II and, by focusing on the real people and the relationships that lie at the heart of espionage, illustrates the danger, the drama, the intrigue, and the moral ambiguities that come with working for British intelligence. From the defining period of the early Cold War through modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organization to its modern, no less controversial, incarnation. And some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied, and in some cases nearly died in service of the state. They range from the spymasters to the agents they controlled to their sworn enemies, and the result is a “fast-paced” examination that ranges “from the covert diplomacy of the Cold War to recent security concerns in Afghanistan and the Middle East” (The Times, London).  
The fascinating, untold story of how British intelligence secretly used homing pigeons as part of a clandestine espionage operation to gather information, communicate, and coordinate with members of the Resistance to defeat the Nazis in occupied Europe during World War II.

Between 1941 and 1944, British intelligence dropped sixteen thousand homing pigeons in an arc across Nazi-occupied Europe, from Bordeaux, France to Copenhagen, Denmark, as part of a spy operation code-named Columba. Returning to MI14, the secret government branch in charge of the "Special Pigeon Service," the birds carried messages that offered a glimpse of life under the Germans in rural France, Holland, and Belgium. Written on tiny pieces of rice paper tucked into canisters and tied to the birds’ legs, these messages were sometimes comic, often tragic, and occasionally invaluable—reporting details of German troop movements and fortifications, new Nazi weapons, radar systems, and even the deployment of the feared V-1 and V-2 rockets used to terrorize London.

The people who sent these messages were not trained spies. They were ordinary men and women willing to risk their lives in the name of freedom, including the "Leopold Vindictive" network—a small group of Belgian villagers led by an extraordinary priest named Joseph Raskin. The intelligence Raskin sent back by pigeon proved so valuable that it reached Churchill and MI6 parachuted agents behind enemy lines to assist him.

Gordon Corera uses declassified documents and extensive original research to tell the story of the Operation Columba and the Secret Pigeon Service for the first time. A powerful tale of wartime espionage, bitter rivalries, extraordinary courage, astonishing betrayal, harrowing tragedy, and a quirky, quarrelsome band of spy masters and their special mission, Operation Columba opens a fascinating new chapter in the annals of World War II. It is ultimately, the story of how, in one of the darkest and most dangerous times in history, under threat of death, people bravely chose to resist.

©2020 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.