We Are Anonymous

Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Author: Parmy Olson

Publisher: Little, Brown

ISBN: 0316213535

Category: Political Science

Page: 512

View: 7199

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec. WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel. Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids? WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Posted in Political Science

We Are Anonymous

Author: Parmy Olson

Publisher: Random House

ISBN: 1448136156

Category: True Crime

Page: 528

View: 8353

In January 2012, the hacker collective Anonymous brought down the FBI website in response to planned American laws against internet piracy. In 2011, LulzSec, a sister organisation, broke into and blocked computer systems at VISA, Mastercard and PayPal. The groups have infiltrated the networks of totalitarian governments in Libya and Tunisia. They have attacked the CIA and NATO. But instead of being sanctimonious and secretive, these cyber activists are flippant and taunting, never hesitating to mock those they've outsmarted. Today, governments, big businesses and social activists are waking up to the true power of the internet, and how it can be manipulated. This is the story of a hive mind, with many hackers across the globe connected to slice through security systems and escape untraced. Through the stories of four key members, We Are Anonymous offers a gripping, adrenalin-fuelled narrative drawing upon extensive research, and hundreds of conversations with the hackers themselves. By coming to know them - their backgrounds, families, motivations - we come to know the human side of their virtual exploits, showing exactly why they're so passionate about disrupting the internet's frontiers.
Posted in True Crime

Hacker, Hoaxer, Whistleblower, Spy

The Many Faces of Anonymous

Author: Gabriella Coleman

Publisher: Verso Books

ISBN: 1781685843

Category: Political Science

Page: 256

View: 1941

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets.” Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.” From the Hardcover edition.
Posted in Political Science

The Social Media Reader

Author: Michael Mandiberg

Publisher: NYU Press

ISBN: 0814764053

Category: Computers

Page: 289

View: 6894

With the rise of web 2.0 and social media platforms taking over vast tracts of territory on the internet, the media landscape has shifted drastically in the past 20 years, transforming previously stable relationships between media creators and consumers. The Social Media Reader is the first collection to address the collective transformation with pieces on social media, peer production, copyright politics, and other aspects of contemporary internet culture from all the major thinkers in the field. Culling a broad range and incorporating different styles of scholarship from foundational pieces and published articles to unpublished pieces, journalistic accounts, personal narratives from blogs, and whitepapers, The Social Media Reader promises to be an essential text, with contributions from Lawrence Lessig, Henry Jenkins, Clay Shirky, Tim O'Reilly, Chris Anderson, Yochai Benkler, danah boyd, and Fred von Loehmann, to name a few. It covers a wide-ranging topical terrain, much like the internet itself, with particular emphasis on collaboration and sharing, the politics of social media and social networking, Free Culture and copyright politics, and labor and ownership. Theorizing new models of collaboration, identity, commerce, copyright, ownership, and labor, these essays outline possibilities for cultural democracy that arise when the formerly passive audience becomes active cultural creators, while warning of the dystopian potential of new forms of surveillance and control.
Posted in Computers

Epic Win for Anonymous: How 4chan's Army Conquered the Web

Author: Cole Stryker

Publisher: Gerald Duckworth & Co

ISBN: 0715642855

Category: Social Science

Page: 304

View: 8934

This is the story of the 'Anti-Facebook': a site that radically encourages anonymity. It was the 4chan group Anonymous which famously defended WikiLeaks founder Julian Assange by hacking and taking down MasterCard's and Visa's websites. Longtime blogger and member Cole Stryker writes with a voice that is engrossingly informative and approachable. Whether examining the Anonymous-provoked Jessi Slaughter saga and how cyberbullying is part of our new reality, or explaining how Sarah Palin's email account was leaked, Epic Win for Anonymous proves the group's transformative cultural impact, how it has influenced — and how such groups will increasingly influence — society at large.
Posted in Social Science

Kingpin

How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Author: Kevin Poulsen

Publisher: Broadway Books

ISBN: 0307588696

Category: Technology & Engineering

Page: 266

View: 6116

Documents how a troubled young computer hacker seized control of a massive international computer fraud network in 2006, tracing the efforts of FBI and Secret Service agents as well as an undercover operator to locate and arrest him. Reprint.
Posted in Technology & Engineering

Countdown to Zero Day

Stuxnet and the Launch of the World's First Digital Weapon

Author: Kim Zetter

Publisher: Crown

ISBN: 0770436188

Category: History

Page: 448

View: 5108

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
Posted in History

Hackers

Heroes of the Computer Revolution - 25th Anniversary Edition

Author: Steven Levy

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449393748

Category:

Page: 520

View: 2952

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers. Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
Posted in

Ghost in the Wires

My Adventures as the World's Most Wanted Hacker

Author: Kevin Mitnick

Publisher: Little, Brown

ISBN: 0316134473

Category: Computers

Page: 432

View: 7083

The thrilling memoir of the world's most wanted computer hacker "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes--and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information.
Posted in Computers

Manifesto for the Earth

Action Now for Peace, Global Justice and a Sustainable Future

Author: Mikhail Sergeevich Gorbachev

Publisher: CLAIRVIEW BOOKS

ISBN: 9781905570027

Category: Philosophy

Page: 147

View: 1176

Argues that the international community needs to scrutinize structural factors, such as nationalism and consumerism, which are inhibiting sustainable development.
Posted in Philosophy

Spam Nation

The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

Author: Brian Krebs

Publisher: Sourcebooks, Inc.

ISBN: 1402295634

Category: Political Science

Page: 256

View: 4443

Now a New York Times bestseller! There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life. In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere. Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma"-who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords-Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets. Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can-and do-hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too. Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime-before it's too late. "Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals... His track record of scoops...has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." -Bloomberg Businessweek
Posted in Political Science

CUCKOO'S EGG

Author: Clifford Stoll

Publisher: Doubleday

ISBN: 0307819426

Category: True Crime

Page: 326

View: 2239

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Posted in True Crime

Move Fast and Break Things

How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy

Author: Jonathan Taplin

Publisher: Little, Brown

ISBN: 0316275743

Category: Computers

Page: 320

View: 8672

*The book that started the Techlash* A stinging polemic that traces the destructive monopolization of the Internet by Google, Facebook and Amazon, and that proposes a new future for musicians, journalists, authors and filmmakers in the digital age. Featured in New York Times' Paperback Row A New York Times Book Review Editors' ChoiceAn Amazon Best Business & Leadership Book of 2017 Longlisted for Financial Times/McKinsey Business Book of the Year 2017A strategy+business Best Business Book of 2017 Move Fast and Break Things is the riveting account of a small group of libertarian entrepreneurs who in the 1990s began to hijack the original decentralized vision of the Internet, in the process creating three monopoly firms--Facebook, Amazon, and Google--that now determine the future of the music, film, television, publishing and news industries. Jonathan Taplin offers a succinct and powerful history of how online life began to be shaped around the values of the men who founded these companies, including Peter Thiel and Larry Page: overlooking piracy of books, music, and film while hiding behind opaque business practices and subordinating the privacy of individual users in order to create the surveillance-marketing monoculture in which we now live. The enormous profits that have come with this concentration of power tell their own story. Since 2001, newspaper and music revenues have fallen by 70 percent; book publishing, film, and television profits have also fallen dramatically. Revenues at Google in this same period grew from $400 million to $74.5 billion. Today, Google's YouTube controls 60 percent of all streaming-audio business but pay for only 11 percent of the total streaming-audio revenues artists receive. More creative content is being consumed than ever before, but less revenue is flowing to the creators and owners of that content. The stakes here go far beyond the livelihood of any one musician or journalist. As Taplin observes, the fact that more and more Americans receive their news, as well as music and other forms of entertainment, from a small group of companies poses a real threat to democracy. Move Fast and Break Things offers a vital, forward-thinking prescription for how artists can reclaim their audiences using knowledge of the past and a determination to work together. Using his own half-century career as a music and film producer and early pioneer of streaming video online, Taplin offers new ways to think about the design of the World Wide Web and specifically the way we live with the firms that dominate it.
Posted in Computers

I Know Who You Are and I Saw What You Did

Social Networks and the Death of Privacy

Author: Lori Andrews

Publisher: Simon and Schuster

ISBN: 1451651066

Category: Technology & Engineering

Page: 272

View: 3073

Hailed as “stunning” (New York Post), “authoritative” (Kirkus Reviews), and “comprehensively researched” (Shelf Awareness), a shocking exposé of the widespread abuses of our personal online data by a leading specialist on Web privacy. Social networks, the defining cultural movement of our time, offer many freedoms. But as we work and shop and date over the Web, we are opening ourselves up to intrusive privacy violations by employers, the police, and aggressive data collection companies that sell our information to any and all takers. Through groundbreaking research, Andrews reveals how routinely colleges reject applicants due to personal information searches, robbers use vacation postings to target homes for break-ins, and lawyers scour our social media for information to use against us in court. And the legal system isn't protecting us—in the thousands of privacy violations brought to trial, judges often rule against the victims. Providing expert advice and leading the charge to secure our rights, Andrews proposes a Social Network Constitution to protect us all. Now is the time to join her and take action—the very future of privacy is at stake. Log on to www.loriandrews.com to sign the Constitution for Web Privacy.
Posted in Technology & Engineering

Documentary Media

History, Theory, Practice

Author: Broderick Fox

Publisher: Routledge

ISBN: 1317195183

Category: Social Science

Page: 350

View: 2825

In a digital moment where both the democratizing and totalitarian possibilities of media are unprecedented, the need for complex, ethical, and imaginative documentary media—for you, the reader of this book to think, question, and create—is vital. Whether you are an aspiring or seasoned practitioner, an activist or community leader, a student or scholar, or simply a curious audience member, author Broderick Fox opens up documentary media, its changing forms, and diversifying social functions to readers in a manner that is at once rigorous, absorbing, and practical. This new edition updates and further explores the various histories, ideas, and cultural debates that surround and shape documentary practice today. Each chapter engages readers by challenging traditional assumptions, posing critical and creative questions, and offering up innovative historical and contemporary examples. Additionally, each chapter closes with an "Into Practice" section that provides analysis and development exercises and hands-on projects that will assist you in generating a full project prospectus, promotional trailer, and web presence for your own documentary.
Posted in Social Science

WikiLeaks

Inside Julian Assange's War on Secrecy

Author: David Leigh,Luke Harding,The Guardian

Publisher: Faber & Faber

ISBN: 1783350180

Category: Political Science

Page: 304

View: 3247

Published to coincide with the forthcoming film, The Fifth Estate, starring Beneditct Cumberbatch, this tie-in edition contains two new chapters on Julian Assange and Bradley Manning, and a foreword by Alan Rusbridger. It was the biggest leak in history. WikiLeaks infuriated the world's greatest superpower, embarrassed the British royal family and helped cause a revolution in Africa. The man behind it was Julian Assange, one of the strangest figures ever to become a worldwide celebrity. Was he an internet messiah or a cyber-terrorist? Information freedom fighter or sex criminal? The debate echoed around the globe as US politicians called for his assassination. And Assange's actions continue to be felt, in the trial of Bradley Manning and the flight of Edward Snowden, the NSA whistleblower. Award-winning Guardian journalists David Leigh and Luke Harding were at the centre of a unique publishing drama that involved the release of some 250,000 secret diplomatic cables and classified files from the Afghan and Iraq wars. (At one point the platinum-haired hacker was hiding from the CIA in David Leigh's London house.) Now, together with the paper's investigative reporting team, Leigh and Harding reveal the startling inside story of the man and the leak, and bring the story dramatically up to date.
Posted in Political Science

Exploding the Phone

The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell

Author: Phil Lapsley

Publisher: Open Road + Grove/Atlantic

ISBN: 0802193757

Category: History

Page: 416

View: 9762

“A rollicking history of the telephone system and the hackers who exploited its flaws” (Kirkus Reviews, starred review). Before smartphones, back even before the Internet and personal computers, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same. Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T’s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell’s Achilles heel. Phil Lapsley expertly weaves together the clandestine underground of “phone phreaks” who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI. The product of extensive original research, Exploding the Phone is a ground-breaking, captivating book that “does for the phone phreaks what Steven Levy’s Hackers did for computer pioneers” (Boing Boing). “An authoritative, jaunty and enjoyable account of their sometimes comical, sometimes impressive and sometimes disquieting misdeeds.” —The Wall Street Journal “Brilliantly researched.” —The Atlantic “A fantastically fun romp through the world of early phone hackers, who sought free long distance, and in the end helped launch the computer era.” —The Seattle Times
Posted in History

Cyberpunk

Outlaws and Hackers on the Computer Frontier, Revised

Author: Katie Hafner,John Markoff

Publisher: Simon and Schuster

ISBN: 0684818620

Category: Science

Page: 396

View: 8520

Profiles computer hackers who overstep ethical boundaries and break the law to penetrate society's most sensitive computer networks.
Posted in Science

Cyberspace and the State

Towards a Strategy for Cyber-Power

Author: David J. Betz

Publisher: Routledge

ISBN: 1351224522

Category: History

Page: 160

View: 5814

The major aim of Cyberspace and the State is to provide conceptual orientation on the new strategic environment of the Information Age. It seeks to restore the equilibrium of policy-makers which has been disturbed by recent cyber scares, as well as to bring clarity to academic debate on the subject particularly in the fields of politics and international relations, war and strategic studies. Its main chapters explore the impact of cyberspace upon the most central aspects of statehood and the state system?power, sovereignty, war, and dominion. It is concerned equally with practice as with theory and may be read in that sense as having two halves.
Posted in History

America the Vulnerable

Struggling to Secure the Homeland

Author: Stephen Flynn

Publisher: Harper Collins

ISBN: 9780061852930

Category: Political Science

Page: 272

View: 3549

In this powerful and urgently needed call to action, national security expert Stephen Flynn offers a startling portrait of the radical shortcomings in America's plan for homeland security. He describes a frightening scenario of what the next major terrorist attack might look like -- revealing the tragic loss of life and economic havoc it would leave in its wake, as well as the seismic political consequences it would have in Washington. Flynn also shows us how to prepare for such a disaster, outlining a bold yet practical plan for achieving security in a way that is safe and smart, effective and manageable. In this new world of heightened risk and fear, America the Vulnerable delivers a timely, forceful message that cannot be ignored.
Posted in Political Science