Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Hack to the Future
How World Governments Relentlessly Pursue and Domesticate Hackers
Buch von Emily Crose
Sprache: Englisch

28,40 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung

DISCOVER THE FASCINATING HISTORY OF HOW THE UNITED STATES GOVERNMENT TRANSFORMED HACKERS INTO A POWERFUL GEOPOLITICAL WEAPON

Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers is an intriguing and one-of-a-kind exploration of the singular relationship between the United States government and the U.S. hacking subculture over the last several decades. Author and veteran infosec expert Emily Crose explores the complicated and fraught interactions between the two groups, demonstrating how the state sought to weaponize and exploit what began as a nerdy group of bored, young, males, eventually transforming them into a novel and effective geopolitical weapon.

You'll discover how major cybersecurity events, like the releases of the Morris worm and the Melissa virus changed the way the American and international public perceived and understood hackers and how various government entities, including the National Security Agency (NSA) and the National Aeronautics and Space Agency (NASA), treated--and were treated by--hackers.

An essential and fascinating read that's perfect for anyone interested in U.S. foreign policy, technology, information security, and government, Hack to the Future will earn a prominent place in the libraries of everyone seeking to deepen their understanding of how contemporary hacking culture came to be.

DISCOVER THE FASCINATING HISTORY OF HOW THE UNITED STATES GOVERNMENT TRANSFORMED HACKERS INTO A POWERFUL GEOPOLITICAL WEAPON

Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers is an intriguing and one-of-a-kind exploration of the singular relationship between the United States government and the U.S. hacking subculture over the last several decades. Author and veteran infosec expert Emily Crose explores the complicated and fraught interactions between the two groups, demonstrating how the state sought to weaponize and exploit what began as a nerdy group of bored, young, males, eventually transforming them into a novel and effective geopolitical weapon.

You'll discover how major cybersecurity events, like the releases of the Morris worm and the Melissa virus changed the way the American and international public perceived and understood hackers and how various government entities, including the National Security Agency (NSA) and the National Aeronautics and Space Agency (NASA), treated--and were treated by--hackers.

An essential and fascinating read that's perfect for anyone interested in U.S. foreign policy, technology, information security, and government, Hack to the Future will earn a prominent place in the libraries of everyone seeking to deepen their understanding of how contemporary hacking culture came to be.

Über den Autor

EMILY CROSE is a senior technical director at Sophos Labs. She works on Linux runtime threat detection and has over a decade's experience in the field of information security. She served in the U.S. intelligence community for seven years before entering the private sector and is the co-founder of Hacking History, a project investigating the United States government's handling of the hacking community.

Inhaltsverzeichnis

Introduction xv

Part 1 The Pre-Broadband Era 1

Chapter 1 A Subculture Explained 3

Defining a Community 7

Common Hacking Virtues 8

Curiosity 8

Mischief 9

Defiance 10

Perseverance 10

Terms 11

Hackers and Secrecy 15

Summary 17

Chapter 2 Uncle Sam and Technology 19

World War I 21

Codebreaking 22

The Cold War 23

Foreign Intelligence 25

The INTs 26

Sigint 26

Comint 27

Humint 27

Central Intelligence Agency 28

Computer Scientists of Operation Paperclip 28

National Security Agency 30

Federal Bureau of Investigation 31

Advanced Research Projects Agency 32

The Development of ARPANET 32

ARPANET in Practice 34

Packet Switching 34

National Aeronautics and Space Administration 35

NASA Hackers 35

A Leak in the Walled Garden 38

Chapter 3 Commercializing Technology 39

Telephony 39

The Phone Phreakers 40

One Whistle to Rule Them All 44

Blue and Red Boxes 45

Rock Stars Are Born 47

The Missing Stair 49

The Personal Computer 50

Altair 8800 50

Apple I and II 51

Communities 52

Community Memory 52

Jude Milhon 54

Age of the Bulletin Board System 55

Party Lines 58

Chapter 4 Digital Disruption 61

Viral Genesis 64

Creeper and Reaper 65

Wabbits 67

Virus or Not? 69

Xerparc 70

Government in the 1970s 72

Law Enforcement 74

The ARPANET Spam Incident 78

Chapter 5 Hacker Rehabilitation 81

Dark Dante and the ARPANET Breach 82

The Los Alamos National Labs Breach 85

The 414s 87

Shaping the Hacker Image 89

Congressional Testimony 89

The Morris Worm 91

Legal Implications of Hacking 95

WANK and OILZ 96

Investigation 99

Hacktivism 100

Chapter 6 On the Other Side of The Wall 101

Soviet Intelligence 104

A "Closed Society" 106

Glasnost and Perestroika 106

Computers and Telecommunications 107

Soviet Phreaking 108

Building a Soviet Internet 110

Soviet Programming 112

Soviet Understanding of Hacking 113

Post-Soviet Russia 113

A New Class of Criminal 114

Chapter 7 Hackers of the World, Unite! 117

Project Cybersyn 118

Get Me Beer! 119

Building the Network 120

Operation Condor 121

Project Cybersyn's Epitaph 122

Chaos Computer Club 123

Chaos Computer Club France 126

Building Teletext 128

The Prestel Hack 129

Overseas Cooperation 131

The Australian Scene 131

AFP Tracking of Realm 132

Chapter 8 Electronic Delinquents 135

Digital Spycraft 136

Protecting America's Defense Networks 137

American Code Making 138

Church and Pike 139

The Rainbow Series 141

The Clipper Chip 142

Prosecuting the 414s 144

Hackers on Trial 145

Operation Sundevil 147

Sundevil Blowback 148

The Crypto Wars 150

Digital Bullets 151

Chapter 9 Hackers Go Mainstream 153

Computer Fraud and Abuse 154

Kevin "Dark Dante" Poulsen 155

Kevin "Condor" Mitnick 157

Fugitive Mitnick 157

Free Kevin 159

Fallout from the Arrests 159

Forging the Hacker Image 161

1960's Movie Hackers 161

1980's Movie Hackers 162

Falken's Maze 163

Matthew Broderick 163

1990's Movie Hackers 166

Hackers 167

Chapter 10 The DEF CON Effect 171

An Internet for Everyone 172

A Great Migration 174

Web Defacements 175

Y2k 176

Hacker Conferences 177

The Business of Hacking 180

Spot the Fed 182

Part 2 The Post-Broadband Era 189

Chapter 11 In from the Cold 191

Hackers Meet Congress 192

Development of the Red Team 195

Operation Cybersnare 196

Thinking About the Future 198

Evident Surprise and Eligible Receiver 201

Chapter 12 Anonymous 205

USA PATRIOT Act 207

Project Chanology 208

HBGary 212

Chapter 13 Spy vs. Spy 219

"Collateral Murder" 220

Chapter 14 Cybernetting Society 231

Consumer Electronics 232

A Politicized Internet 234

Global Instability 236

Arab Spring 237

Operation Tunisia 238

The Syrian Electronic Army 240

The Euromaidan Protests 245

Chapter 15 Hackers Unleashed 247

Solar Sunrise 248

Advanced Persistent Threat 250

Emergence of Chinese Hacking 254

American Elite 255

A New Domain 258

Chapter 16 Cyberwar 261

Operation Uphold Democracy 264

Cyberwarfare in Concept 266

Stuxnet 268

Combatant Hackers 270

Ukrainian Blackouts 273

Chapter 17 Politics As Usual 279

Memetic Warfare 281

Election Interference 283

Hacking Elections at DEF CON 287

Epilogue 291

Cisa 292

Pillar II 294

Cyberwarfare in the 2020s 296

The Way from Here 297

Acknowledgments 299

About the Author 301

Index 303

Details
Erscheinungsjahr: 2024
Genre: Importe, Politikwissenschaften
Rubrik: Wissenschaften
Medium: Buch
ISBN-13: 9781394169825
ISBN-10: 1394169825
Sprache: Englisch
Einband: Gebunden
Autor: Crose, Emily
Hersteller: Wiley
Verantwortliche Person für die EU: preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de
Maße: 231 x 160 x 24 mm
Von/Mit: Emily Crose
Erscheinungsdatum: 05.12.2024
Gewicht: 0,544 kg
Artikel-ID: 127871614
Über den Autor

EMILY CROSE is a senior technical director at Sophos Labs. She works on Linux runtime threat detection and has over a decade's experience in the field of information security. She served in the U.S. intelligence community for seven years before entering the private sector and is the co-founder of Hacking History, a project investigating the United States government's handling of the hacking community.

Inhaltsverzeichnis

Introduction xv

Part 1 The Pre-Broadband Era 1

Chapter 1 A Subculture Explained 3

Defining a Community 7

Common Hacking Virtues 8

Curiosity 8

Mischief 9

Defiance 10

Perseverance 10

Terms 11

Hackers and Secrecy 15

Summary 17

Chapter 2 Uncle Sam and Technology 19

World War I 21

Codebreaking 22

The Cold War 23

Foreign Intelligence 25

The INTs 26

Sigint 26

Comint 27

Humint 27

Central Intelligence Agency 28

Computer Scientists of Operation Paperclip 28

National Security Agency 30

Federal Bureau of Investigation 31

Advanced Research Projects Agency 32

The Development of ARPANET 32

ARPANET in Practice 34

Packet Switching 34

National Aeronautics and Space Administration 35

NASA Hackers 35

A Leak in the Walled Garden 38

Chapter 3 Commercializing Technology 39

Telephony 39

The Phone Phreakers 40

One Whistle to Rule Them All 44

Blue and Red Boxes 45

Rock Stars Are Born 47

The Missing Stair 49

The Personal Computer 50

Altair 8800 50

Apple I and II 51

Communities 52

Community Memory 52

Jude Milhon 54

Age of the Bulletin Board System 55

Party Lines 58

Chapter 4 Digital Disruption 61

Viral Genesis 64

Creeper and Reaper 65

Wabbits 67

Virus or Not? 69

Xerparc 70

Government in the 1970s 72

Law Enforcement 74

The ARPANET Spam Incident 78

Chapter 5 Hacker Rehabilitation 81

Dark Dante and the ARPANET Breach 82

The Los Alamos National Labs Breach 85

The 414s 87

Shaping the Hacker Image 89

Congressional Testimony 89

The Morris Worm 91

Legal Implications of Hacking 95

WANK and OILZ 96

Investigation 99

Hacktivism 100

Chapter 6 On the Other Side of The Wall 101

Soviet Intelligence 104

A "Closed Society" 106

Glasnost and Perestroika 106

Computers and Telecommunications 107

Soviet Phreaking 108

Building a Soviet Internet 110

Soviet Programming 112

Soviet Understanding of Hacking 113

Post-Soviet Russia 113

A New Class of Criminal 114

Chapter 7 Hackers of the World, Unite! 117

Project Cybersyn 118

Get Me Beer! 119

Building the Network 120

Operation Condor 121

Project Cybersyn's Epitaph 122

Chaos Computer Club 123

Chaos Computer Club France 126

Building Teletext 128

The Prestel Hack 129

Overseas Cooperation 131

The Australian Scene 131

AFP Tracking of Realm 132

Chapter 8 Electronic Delinquents 135

Digital Spycraft 136

Protecting America's Defense Networks 137

American Code Making 138

Church and Pike 139

The Rainbow Series 141

The Clipper Chip 142

Prosecuting the 414s 144

Hackers on Trial 145

Operation Sundevil 147

Sundevil Blowback 148

The Crypto Wars 150

Digital Bullets 151

Chapter 9 Hackers Go Mainstream 153

Computer Fraud and Abuse 154

Kevin "Dark Dante" Poulsen 155

Kevin "Condor" Mitnick 157

Fugitive Mitnick 157

Free Kevin 159

Fallout from the Arrests 159

Forging the Hacker Image 161

1960's Movie Hackers 161

1980's Movie Hackers 162

Falken's Maze 163

Matthew Broderick 163

1990's Movie Hackers 166

Hackers 167

Chapter 10 The DEF CON Effect 171

An Internet for Everyone 172

A Great Migration 174

Web Defacements 175

Y2k 176

Hacker Conferences 177

The Business of Hacking 180

Spot the Fed 182

Part 2 The Post-Broadband Era 189

Chapter 11 In from the Cold 191

Hackers Meet Congress 192

Development of the Red Team 195

Operation Cybersnare 196

Thinking About the Future 198

Evident Surprise and Eligible Receiver 201

Chapter 12 Anonymous 205

USA PATRIOT Act 207

Project Chanology 208

HBGary 212

Chapter 13 Spy vs. Spy 219

"Collateral Murder" 220

Chapter 14 Cybernetting Society 231

Consumer Electronics 232

A Politicized Internet 234

Global Instability 236

Arab Spring 237

Operation Tunisia 238

The Syrian Electronic Army 240

The Euromaidan Protests 245

Chapter 15 Hackers Unleashed 247

Solar Sunrise 248

Advanced Persistent Threat 250

Emergence of Chinese Hacking 254

American Elite 255

A New Domain 258

Chapter 16 Cyberwar 261

Operation Uphold Democracy 264

Cyberwarfare in Concept 266

Stuxnet 268

Combatant Hackers 270

Ukrainian Blackouts 273

Chapter 17 Politics As Usual 279

Memetic Warfare 281

Election Interference 283

Hacking Elections at DEF CON 287

Epilogue 291

Cisa 292

Pillar II 294

Cyberwarfare in the 2020s 296

The Way from Here 297

Acknowledgments 299

About the Author 301

Index 303

Details
Erscheinungsjahr: 2024
Genre: Importe, Politikwissenschaften
Rubrik: Wissenschaften
Medium: Buch
ISBN-13: 9781394169825
ISBN-10: 1394169825
Sprache: Englisch
Einband: Gebunden
Autor: Crose, Emily
Hersteller: Wiley
Verantwortliche Person für die EU: preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de
Maße: 231 x 160 x 24 mm
Von/Mit: Emily Crose
Erscheinungsdatum: 05.12.2024
Gewicht: 0,544 kg
Artikel-ID: 127871614
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte