Loaded for Guccifer2.0


Book Description

On the 15th June 2016 the `Lone Hacker' Guccifer2.0 claimed to have hacked the Democratic National Committee in Washington DC. According to himself, he was a genius. According to the United States government, he was a Russian spy. According to the norms of the hacking business, the guy was an idiot. Guccifer2.0 wasn't a normal hacker. He didn't consider leaving clues to be a career limiting move. He risked exposure and goaded the intelligence agencies of the entire Western world by leaving an obvious trail for them to follow.He also left some trails by accident, which led to where some didn't want to go. Loaded for Guccifer follows those trails to a conclusion that turns the establishment narrative on it's head. It's a trail of geopolitics, statecraft, and dirty digital tricks that started well before the 2016 US Presidential election season.Along the way we find out who and what Guccifer2.0, Fancy Bear, and Cozy Bear were. We find out why it started, who started it, and why it's never going to end.




This Is How They Tell Me the World Ends


Book Description

THE INSTANT NEW YORK TIMES BESTSELLER 'An intricately detailed, deeply sourced and reported history of the origins and growth of the cyberweapons market . . . Hot, propulsive . . . Sets out from the start to scare us out of our complacency' New York Times 'A terrifying exposé' The Times 'Part John le Carré and more parts Michael Crichton . . . Spellbinding' New Yorker Zero day: a software bug that allows a hacker to break in and scamper through the world's computer networks invisibly until discovered. One of the most coveted tools in a spy's arsenal, a zero day has the power to tap into any iPhone, dismantle safety controls at a chemical plant and shut down the power in an entire nation – just ask the Ukraine. Zero days are the blood diamonds of the security trade, pursued by nation states, defense contractors, cybercriminals, and security defenders alike. In this market, governments aren't regulators; they are clients – paying huge sums to hackers willing to turn over gaps in the Internet, and stay silent about them. This Is How They Tell Me the World Ends is cybersecurity reporter Nicole Perlroth's discovery, unpacked. A intrepid journalist unravels an opaque, code-driven market from the outside in – encountering spies, hackers, arms dealers, mercenaries and a few unsung heroes along the way. As the stakes get higher and higher in the rush to push the world's critical infrastructure online, This Is How They Tell Me the World Ends is the urgent and alarming discovery of one of the world's most extreme threats.




The Mueller Report


Book Description

ONE OF TIME’S 100 BEST BOOKS OF THE YEAR The Crucial #1 New York Times Bestseller “The Mueller report is that rare Washington tell-all that surpasses its pre-publication hype…the best book by far on the workings of the Trump presidency.” —Carlos Lozada, The Washington Post The only book with exclusive analysis by the Pulitzer Prize–winning staff of The Washington Post, and the most complete and authoritative available. Read the findings of the Special Counsel’s investigation into Russian interference in the 2016 election, complete with accompanying analysis by the Post reporters who’ve covered the story from the beginning. This edition from The Washington Post/Scribner contains: —The long-awaited Report On The Investigation Into Russian Interference In The 2016 Presidential Election —An introduction by The Washington Post titled “A President, a Prosecutor, and the Protection of American Democracy” —A timeline of the major events of the Special Counsel’s investigation from May 2017, when Robert Mueller was appointed, to the report's delivery —A guide to individuals involved, including in the Special Counsel’s Office, the Department of Justice, the FBI, the Trump Campaign, the White House, the Trump legal defense team, and the Russians —Key documents in the Special Counsel’s investigation, including filings pertaining to General Michael T. Flynn, Paul Manafort, Michael Cohen, Roger Stone, and the Russian internet operation in St. Petersburg. Each document is introduced and explained by Washington Post reporters. One of the most urgent and important investigations ever conducted, the Mueller inquiry focuses on Donald Trump, his presidential campaign, and Russian interference in the 2016 election, and draws on the testimony of dozens of witnesses and the work of some of the country’s most seasoned prosecutors. The special counsel’s investigation looms as a turning point in American history. The Mueller Report is essential reading for all citizens concerned about the fate of the presidency and the future of our democracy.




The Art of Cyberwarfare


Book Description

A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors. The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers’ techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of: North Korea’s series of cyber attacks against financial institutions, which resulted in billions of dollars stolen The world of targeted ransomware attacks, which have leveraged nation state tactics to cripple entire corporate enterprises with ransomware Recent cyber attacks aimed at disrupting or influencing national elections globally The book’s second part walks through how defenders can track and attribute future attacks. You’ll be provided with the tools, methods, and analytical guidance required to dissect and research each stage of an attack campaign. Here, Jon DiMaggio demonstrates some of the real techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among many other advanced threats. He now offers his experience to train the next generation of expert analysts.




The Mueller Report


Book Description

The historic report on the investigation into Russian interference in the 2016 presidential election—with forewords by two former congressmen. In the future, The Mueller Report may be judged as the most important document of our time. And no matter where you reside on the American political spectrum, you will probably agree that it will have far-reaching implications for the balance of power among the three coequal branches of government that create, administer, and apply the laws of our republic. This edition includes forewords by Lt. Col. Allen B. West (Ret.), and the Hon. Dan Boren, both former US congressmen. Having served on opposite sides of the aisle while Robert Mueller served as director of the FBI, they hold insight into the leadership of the organization created expressly to investigate the questions answered by this report.




Cyber Operations and International Law


Book Description

This book offers a comprehensive overview of the international law applicable to cyber operations. It is grounded in international law, but is also of interest for non-legal researchers, notably in political science and computer science. Outside academia, it will appeal to legal advisors, policymakers, and military organisations.




Sandworm


Book Description

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.




Deception


Book Description

The ‘Russiagate’ affair is one of the most far-reaching political events of recent years. But what exactly was the nature and extent of Russian interference in the campaign that led to the presidency of Donald J. Trump? Richard Sakwa sets out the dramatic series of events that combined to create Russiagate and examines whether together they form a persuasive account of Russia’s role in the extraordinary 2016 American election. Offering a meticulous account of the multiple layers in play, his authoritative analysis challenges the claims of Russian interference and collusion. As we enter into a new cold war, this myth-busting, accessible and balanced account is essential reading to understand contemporary East-West relations.




Fancy Bear Goes Phishing


Book Description

“Unsettling, absolutely riveting, and—for better or worse—necessary reading.” —Brian Christian, author of Algorithms to Live By and The Alignment Problem An entertaining account of the philosophy and technology of hacking—and why we all need to understand it. It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime. Includes black-and-white images




Leadership Matters


Book Description

Sometimes in life there is a person, problem, situation or event that sparks a need to address an issue. The genesis of Leadership Matters was sparked by a Sunday morning sermon, Living in Tumble Weed Times by Rev. Dr. Ralph D. West, of the Church Without Walls- Houston, Texas. Following the 2016 presidential election, his sermon drew the parallels between an unworthy leader from the Old Testament, Book of Judges to the current unworthy leadership occupying the Oval Office in the people’s house. Leadership Matters, takes the reader on a walk down memory lane to the beginning months in office. It is interesting that God will grant an individual time to repent to serve His people according to the honest laws of the land. When not, God will send a message as He did for King Belshazzar in the Book of Daniel, Chapter 5, and as He did in the Book of Judges, Chapter 9. As a sovereign, God will execute his authority to bring His people back to Himself. In essence, He does not make you pray. But in dire times one may wish he had prayed! This is a most read for all people, particularly for Christians.