Hacks, Leaks, and Revelations


Book Description

Data-science investigations have brought journalism into the 21st century, and—guided by The Intercept’s infosec expert Micah Lee— this book is your blueprint for uncovering hidden secrets in hacked datasets. Unlock the internet’s treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism. Dive into exposed datasets from a wide array of sources: the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee’s own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research. Gain practical skills in searching massive troves of data for keywords like “antifa” and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files. You will also learn how to: Master encrypted messaging to safely communicate with whistleblowers. Secure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop. Harvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies. Probe leaked email archives about offshore detention centers and the Heritage Foundation. Analyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network. We live in an age where hacking and whistleblowing can unearth secrets that alter history. Hacks, Leaks, and Revelations is your toolkit for uncovering new stories and hidden truths. Crack open your laptop, plug in a hard drive, and get ready to change history.




R for the Rest of Us


Book Description

Learn how to use R for everything from workload automation and creating online reports, to interpreting data, map making, and more. Written by the founder of a very popular online training platform for the R programming language! The R programming language is a remarkably powerful tool for data analysis and visualization, but its steep learning curve can be intimidating for some. If you just want to automate repetitive tasks or visualize your data, without the need for complex math, R for the Rest of Us is for you. Inside you’ll find a crash course in R, a quick tour of the RStudio programming environment, and a collection of real-word applications that you can put to use right away. You’ll learn how to create informative visualizations, streamline report generation, and develop interactive websites—whether you’re a seasoned R user or have never written a line of R code. You’ll also learn how to: • Manipulate, clean, and parse your data with tidyverse packages like dplyr and tidyr to make data science operations more user-friendly • Create stunning and customized plots, graphs, and charts with ggplot2 to effectively communicate your data insights • Import geospatial data and write code to produce visually appealing maps automatically • Generate dynamic reports, presentations, and interactive websites with R Markdown and Quarto that seamlessly integrate code, text, and graphics • Develop custom functions and packages tailored to your specific needs, allowing you to extend R’s functionality and automate complex tasks Unlock a treasure trove of techniques to transform the way you work. With R for the Rest of Us, you’ll discover the power of R to get stuff done. No advanced statistics degree required.




Leaks, Hacks, and Scandals


Book Description

How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.




Practical Vulnerability Management


Book Description

Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks. Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities. Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose. The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software. Along the way, you'll learn how to: • Generate accurate and usable vulnerability intelligence • Scan your networked systems to identify and assess bugs and vulnerabilities • Prioritize and respond to various security risks • Automate scans, data analysis, reporting, and other repetitive tasks • Customize the provided scripts to adapt them to your own needs Playing whack-a-bug won't cut it against today's advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.




Real-World Bug Hunting


Book Description

Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, ethical hacker Peter Yaworski will show you how it's done. You'll learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery. Using real-life case studies of rewarded vulnerabilities from applications like Twitter, Facebook, Google, and Uber, you'll see how hackers manage to invoke race conditions while transferring money, use URL parameter to cause users to like unintended tweets, and more. Each chapter introduces a vulnerability type accompanied by a series of actual reported bug bounties. The book's collection of tales from the field will teach you how attackers trick users into giving away their sensitive information and how sites may reveal their vulnerabilities to savvy users. You'll even learn how you could turn your challenging new hobby into a successful career. You'll learn: How the internet works and basic web hacking concepts How attackers compromise websites How to identify functionality commonly associated with vulnerabilities How to find bug bounty programs and submit effective vulnerability reports Real-World Bug Hunting is a fascinating soup-to-nuts primer on web security vulnerabilities, filled with stories from the trenches and practical wisdom. With your new understanding of site security and weaknesses, you can help make the web a safer place--and profit while you're at it.




The Hacked World Order


Book Description

For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.




The Art of Machine Learning


Book Description

Learn to expertly apply a range of machine learning methods to real data with this practical guide. Packed with real datasets and practical examples, The Art of Machine Learning will help you develop an intuitive understanding of how and why ML methods work, without the need for advanced math. As you work through the book, you’ll learn how to implement a range of powerful ML techniques, starting with the k-Nearest Neighbors (k-NN) method and random forests, and moving on to gradient boosting, support vector machines (SVMs), neural networks, and more. With the aid of real datasets, you’ll delve into regression models through the use of a bike-sharing dataset, explore decision trees by leveraging New York City taxi data, and dissect parametric methods with baseball player stats. You’ll also find expert tips for avoiding common problems, like handling “dirty” or unbalanced data, and how to troubleshoot pitfalls. You’ll also explore: How to deal with large datasets and techniques for dimension reduction Details on how the Bias-Variance Trade-off plays out in specific ML methods Models based on linear relationships, including ridge and LASSO regression Real-world image and text classification and how to handle time series data Machine learning is an art that requires careful tuning and tweaking. With The Art of Machine Learning as your guide, you’ll master the underlying principles of ML that will empower you to effectively use these models, rather than simply provide a few stock actions with limited practical use. Requirements: A basic understanding of graphs and charts and familiarity with the R programming language




The Google Way


Book Description

For readers seeking deeper insights, 'The Google Way' investigates the history and unconventional strategies that make Google a very different (and very inspiring) company.




Whistleblowing Nation


Book Description

The twenty-first century witnessed a new age of whistleblowing in the United States. Disclosures by Chelsea Manning, Edward Snowden, and others have stoked heated public debates about the ethics of exposing institutional secrets, with roots in a longer history of state insiders revealing privileged information. Bringing together contributors from a range of disciplines to consider political, legal, and cultural dimensions, Whistleblowing Nation is a pathbreaking history of national security disclosures and state secrecy from World War I to the present. The contributors explore the complex politics, motives, and ideologies behind the revelation of state secrets that threaten the status quo, challenging reductive characterizations of whistleblowers as heroes or traitors. They examine the dynamics of state retaliation, political backlash, and civic contests over the legitimacy and significance of the exposure and the whistleblower. The volume considers the growing power of the executive branch and its consequences for First Amendment rights, the protection and prosecution of whistleblowers, and the rise of vast classification and censorship regimes within the national-security state. Featuring analyses from leading historians, literary scholars, legal experts, and political scientists, Whistleblowing Nation sheds new light on the tension of secrecy and transparency, security and civil liberties, and the politics of truth and falsehood.




The Routledge Handbook of EU-Russia Relations


Book Description

The Routledge Handbook of EU-Russia Relations offers a comprehensive overview of the changing dynamics in relations between the EU and Russia provided by leading experts in the field. Coherently organised into seven parts, the book provides a structure through which EU-Russia relations can be studied in a comprehensive yet manageable fashion. It provides readers with the tools to deliver critical analysis of this sometimes volatile and polarising relationship, so new events and facts can be conceptualised in an objective and critical manner. Informed by high-quality academic research and key bilateral data/statistics, it further brings scope, balance and depth, with chapters contributed by a range of experts from the EU, Russia and beyond. Chapters deal with a wide range of policy areas and issues that are highly topical and fundamental to understanding the continuing development of EU-Russia relations, such as political and security relations, economic relations, social relations and regional and global governance. The Routledge Handbook of EU-Russia Relations aims to promote dialogue between the different research agendas in EU-Russia relations, as well as between Russian and Western scholars and, hopefully, also between civil societies. As such, it will be an essential reference for scholars, students, researchers, policymakers and journalists interested and working in the fields of Russian politics/studies, EU studies/politics, European politics/studies, post-Communist/post-Soviet politics and international relations. The Routledge Handbook of EU-Russia Relations is part of a mini-series Europe in the World Handbooks examining EU-regional relations established by Professor Wei Shen.