The Digital Person


Book Description

Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.




From Roman Speculatores to the NSA


Book Description

"From Roman Speculatores to the NSA: Evolution of Espionage and Its Impact on Statecraft and Civil Liberties" is a thrilling journey from the shadows of ancient espionage to the high-tech spy networks of today. It's a must-read for anyone captivated by the enigmatic world of spies, as depicted in iconic fiction like James Bond and John le Carré, but eager to peel back the curtain on the real-life drama of intelligence work. Dive into the clandestine operations that shaped history, from the cunning Speculatores of Rome to the cutting-edge surveillance of the NSA. This book doesn't just recount tales of daring exploits and shadowy figures; it delves deep into the moral and ethical mazes navigated by spies throughout history. As you traverse through time, you'll discover the intricate dance of espionage and statecraft, and how it has continuously morphed to adapt to technological advancements and shifting geopolitical landscapes. "From Roman Speculatores to the NSA" doesn't shy away from the dark side of espionage. It confronts the ethical quagmires, the personal sacrifices of those living double lives, and the impact of clandestine operations on individual freedoms. It's a thought-provoking exploration of how intelligence work, often glamorized in popular culture, grapples with issues like torture, privacy invasion, and the thin line between security and liberty. Perfect for fans of spy fiction seeking to understand the real-life complexities behind the glamour and action, this book is a fascinating guide through the evolution of espionage. It's an eye-opening read that reveals the high stakes and hard choices inherent in a world where knowledge is power, and secrecy is a necessary shield in the game of nations. Prepare to have your perceptions challenged and your understanding of the spy world transformed. The narrative is enriched with case studies and real-world examples, making it a valuable resource for understanding the complexities and challenges of modern intelligence work. The book also addresses the legal frameworks and oversight mechanisms that govern espionage activities, providing a comprehensive overview of the contemporary intelligence landscape. For professionals and scholars in the fields of international relations, security studies, political science, and history, "From Roman Speculatores to the NSA" offers a scholarly yet accessible analysis. It invites readers to critically engage with the strategic, ethical, and legal aspects of espionage and consider its future trajectory in an increasingly interconnected and digital world. This book is a thought-provoking contribution to the discourse on espionage and national security, offering a well-researched and balanced perspective on a subject that continues to be relevant in the field of international affairs




The Mystery of the Zorse's Mask


Book Description

When a mysterious stranger claims to own Becca's beloved zorse, Zed, the Curious Cat Spy Club fears he might be responsible for abusing Zed in the past. Kelsey, Becca, and Leo are determined to uncover the truth before they have to give him away. But when a daring rescue attempt puts Kelsey in danger, does the CCSC have enough spy skills to save her, or are they in over their heads?




Adcreep


Book Description

Advertising is everywhere. By some estimates, the average American is exposed to over 3,000 advertisements each day. Whether we realize it or not, "adcreep"—modern marketing's march to create a world where advertising can be expected anywhere and anytime—has come, transforming not just our purchasing decisions, but our relationships, our sense of self, and the way we navigate all spaces, public and private. Adcreep journeys through the curious and sometimes troubling world of modern advertising. Mark Bartholomew exposes an array of marketing techniques that might seem like the stuff of science fiction: neuromarketing, biometric scans, automated online spies, and facial recognition technology, all enlisted to study and stimulate consumer desire. This marriage of advertising and technology has consequences. Businesses wield rich and portable records of consumer preference, delivering advertising tailored to your own idiosyncratic thought processes. They mask their role by using social media to mobilize others, from celebrities to your own relatives, to convey their messages. Guerrilla marketers turn every space into a potential site for a commercial come-on or clandestine market research. Advertisers now know you on a deeper, more intimate level, dramatically tilting the historical balance of power between advertiser and audience. In this world of ubiquitous commercial appeals, consumers and policymakers are numbed to advertising's growing presence. Drawing on a variety of sources, including psychological experiments, marketing texts, communications theory, and historical examples, Bartholomew reveals the consequences of life in a world of non-stop selling. Adcreep mounts a damning critique of the modern American legal system's failure to stem the flow of invasive advertising into our homes, parks, schools, and digital lives.




The Secret World


Book Description

“A comprehensive exploration of spying in its myriad forms from the Bible to the present day . . . Easy to dip into, and surprisingly funny.” —Ben Macintyre in The New York Times Book Review The history of espionage is far older than any of today’s intelligence agencies, yet largely forgotten. The codebreakers at Bletchley Park, the most successful WWII intelligence agency, were completely unaware that their predecessors had broken the codes of Napoleon during the Napoleonic wars and those of Spain before the Spanish Armada. Those who do not understand past mistakes are likely to repeat them. Intelligence is a prime example. At the outbreak of WWI, the grasp of intelligence shown by US President Woodrow Wilson and British Prime Minister Herbert Asquith was not in the same class as that of George Washington during the Revolutionary War and eighteenth-century British statesmen. In the first global history of espionage ever written, distinguished historian and New York Times–bestselling author Christopher Andrew recovers much of the lost intelligence history of the past three millennia—and shows us its continuing relevance. “Accurate, comprehensive, digestible and startling . . . a stellar achievement.” —Edward Lucas, The Times “For anyone with a taste for wide-ranging and shrewdly gossipy history—or, for that matter, for anyone with a taste for spy stories—Andrew’s is one of the most entertaining books of the past few years.” —Adam Gopnik, The New Yorker “Remarkable for its scope and delightful for its unpredictable comparisons . . . there are important lessons for spymasters everywhere in this breathtaking and brilliant book.” —Richard J. Aldrich, Times Literary Supplement “Fans of Fleming and Furst will delight in this skillfully related true-fact side of the story.” —Kirkus Reviews “A crowning triumph of one of the most adventurous scholars of the security world.” —Financial Times Includes illustrations




Cybercrime and Espionage


Book Description

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO. - Includes detailed analysis and examples of the threats in addition to related anecdotal information - Authors' combined backgrounds of security, military, and intelligence, give you distinct and timely insights - Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them




Manipulated


Book Description

Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late. The updated paperback edition, including new information on real world cases of AI, chatgpt, tiktok, and all the latest and greatest exploits of manipulation campaigns, will leave readers both captivated and chilled to the bone.




Dark Mirror


Book Description

From the three-time Pulitzer Prize-winning author of the New York Times bestseller Angler, who unearthed the deepest secrets of Edward Snowden's NSA archive, the first master narrative of the surveillance state that emerged after 9/11 and why it matters, based on scores of hours of conversation with Snowden and groundbreaking reportage in Washington, London, Moscow and Silicon Valley Edward Snowden chose three journalists to tell the stories in his Top Secret trove of NSA documents: Barton Gellman of The Washington Post, Glenn Greenwald of The Guardian and filmmaker Laura Poitras, all of whom would share the Pulitzer Prize for Public Service. Poitras went on to direct the Oscar-winning Citizen Four. Greenwald wrote an instant memoir and cast himself as a pugilist on Snowden's behalf. Barton Gellman took his own path. Snowden and his documents were the beginning, not the end, of a story he had prepared his whole life to tell. More than 20 years as a top investigative journalist armed him with deep sources in national security and high technology. New sources reached out from government and industry, making contact on the same kinds of secret, anonymous channels that Snowden used. Gellman's old reporting notes unlocked new puzzles in the NSA archive. Long days and evenings with Snowden in Moscow revealed a complex character who fit none of the stock images imposed on him by others. Gellman now brings his unique access and storytelling gifts to a true-life spy tale that touches us all. Snowden captured the public imagination but left millions of people unsure what to think. Who is the man, really? How did he beat the world's most advanced surveillance agency at its own game? Is government and corporate spying as bad as he says? Dark Mirror is the master narrative we have waited for, told with authority and an inside view of extraordinary events. Within it is a personal account of the obstacles facing the author, beginning with Gellman's discovery of his own name in the NSA document trove. Google notifies him that a foreign government is trying to compromise his account. A trusted technical adviser finds anomalies on his laptop. Sophisticated impostors approach Gellman with counterfeit documents, attempting to divert or discredit his work. Throughout Dark Mirror, the author describes an escalating battle against unknown digital adversaries, forcing him to mimic their tradecraft in self-defense. Written in the vivid scenes and insights that marked Gellman's bestselling Angler, Dark Mirror is an inside account of the surveillance-industrial revolution and its discontents, fighting back against state and corporate intrusions into our most private spheres. Along the way it tells the story of a government leak unrivaled in drama since All the President's Men.




Active Measures


Book Description

We live in an age of subterfuge. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm. Even before the 2016 election, he warned that Russian military intelligence was 'carefully planning and timing a high-stakes political campaign' to disrupt the democratic process. But as crafty as such so-called active measures have become, they are not new. In this astonishing journey through a century of secret psychological war, Rid reveals for the first time some of history's most significant operations - many of them nearly beyond belief. A White Russian ploy backfires and brings down a New York police commissioner; a KGB-engineered, anti-Semitic hate campaign creeps back across the Berlin Wall; the CIA backs a fake publishing empire, run by a former Wehrmacht U-boat commander that produces Germany's best jazz magazine.




At the Nexus of Cybersecurity and Public Policy


Book Description

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.