PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Cyberspies: The Secret History of…
Cargando...

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage (edición 2016)

por Gordon Corera (Autor)

MiembrosReseñasPopularidadValoración promediaMenciones
1033264,583 (4.43)1
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace. The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket.… (más)
Miembro:OneThingBYTE
Título:Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
Autores:Gordon Corera (Autor)
Información:Pegasus Books (2016), Edition: 1, 448 pages
Colecciones:Tu biblioteca, Actualmente leyendo, Por leer
Valoración:
Etiquetas:to-read

Información de la obra

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage por Gordon Corera

Ninguno
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

» Ver también 1 mención

Mostrando 3 de 3
I view this book as equipping you to answer the question “Where is the line between the privacy of citizens and the ability to protect them from threats (terrorism, cybercrime, the potential of a hostile state to crash the grid in the event of full out war)?”. It does this by examining the modern (WW1-around Snowden) history of signals intelligence, cryptography, and hacking, and providing examples of mass surveillance winning wars, being used by totalitarian governments to suppress human rights, and successfully and unsuccessfully using surveillance/espionage to protect citizens from extremists and cyber criminals.


It also presents the arguments (with quotes) from a variety of people connected to the cyberintelligence world, and well enough that he had me wanting to agree with several different (and conflicting) stances throughout the book. If the title sounds compelling to you or you’re interested in the modern questions on data collection and use, this won’t give you much technical information, but it will provide you a lot of background on how we got to today and what some of the big issues are. ( )
  jdm9970 | Jan 26, 2023 |
One of the most overlooked parts of the Muller report is the detailed information the FBI et al collected on Russian interference in the 2016 election. They determined the names and location of the GRU officers and cyberspies who conducted the operation, what they did and how they did it. It was an extraordinary piece of sleuthing. (See Sandworm by Andy Greenberg for more details.) Cyberspies places all this in historical context.

This book has something for everyone: history, spying, and interesting characters. While he argues that "hacking" using technology has a long history dating back millennia, he chose to begin with the cutting of German cables on the ocean floor during WW I. Leaping-frogging rather quickly he then begins with the use of computers (people, those who computed) and especially Flowers and Turing who respectively understood the larger picture and how "valves" (vacuum tubes in American) could be used binarily to process data. Along the way, he tries to answer questions of what cyber spying is, how such developed and its impact in today’s world politically, economically, and in the intelligence communities. An ambitious goal indeed.i.e.

There are two key components to the world of spies: attribution, i.e. can you trace back a decision or instruction to its source; and integrity, the accuracy of the data, for getting just one component of a message wrong could mean sending a missile to the wrong target. Scrambling a message so it can't be read by the unauthorized is an inherent part of spycraft and technology has made all of that both easier and more difficult at the same time. “Few outside the intelligence world understand the extent to which spies in the US and Britain perceive technology as an existential threat to their work,” Corera writes. “An arms race is on between spy services to exploit technology. Only those who adapt will survive.”

Spying has more than just military significance. The Russians and others have taken economic espionage to a new level. Collecting information peripherally is important. The author provides an example of Russian trolling for information about a particular executive whom the intelligence services had determined was gay but not out of the closet. “The hackers then sent him an email from a gay rights organization which they suspected he would open since it looked as if it was sent to him, but in fact held malware,” Corera writes. “They then counted on the fact that, even if the executive did suspect it was malware, he would not be willing to go to his company’s IT department or security team for fear it would reveal his sexuality. This is classic, high level, targeted Russian espionage.”

There's intelligence and then there's information. Spying in common parlance conjures up images of dangerous men with guns in tuxedos in scary situations who can leap tall buildings in a single jump. Or the silent bureaucratic types of Le Carre. The author has a wonderful metaphor for the difference in how spying is done by different countries. Let's say you want to find out what kind of sand is on a particular beach in some foreign country. The UK would send a submarine with divers in wet suits (bow ties and suits underneath) to surreptitiously retrieve a sample of sand from the beach. The Americans would use technology to and fly satellites, drones, and planes over the area to take lots of pictures. The Chinese would send tourists to the country to have a good time, visit the beaches, and then shake out their towels when they got home.
It's a comprehensive look at how spying developed, including the misconceptions about what spying is and its development over time into not just military purposes uses but economic, as well. Corera includes a detailed history and an examination of how cyber spying was affected by the revelations of the collection of data by government agencies by Snowden, and suggestions on what the future of cyber spying and offensive actions may hold for us. It's organized in a logical chronological way and intricate cyber threats and attacks are explained clearly.
Some reviewers have complained that a weakness of the book is its specialization and detail; that's what I liked. Unfortunately, the world changes so fast that more recent events are obviously not included. Sandworm by Andy Greenberg fills that gap and should also be read. Overall a fascinating glimpse at the evolution of the new cyber world.

N.B. Years ago I read Clifford Stoll's The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (1990) (how the author tracked down a spy ring because he wanted to know how and why 75 cents of computer time was unaccounted for.) Stoll is highlighted for his work in this book. Stoll also wrote (in 1996) a prescient view of the problems inherent in the Internet: Silicon Snake Oil: Second Thoughts on the Information Highway . For a truly prescient view of the problems with interconnectivity written in 1955, see a SF masterpiece by Thomas Ryan, The Adolescence of P-1 ( )
  ecw0647 | Jun 17, 2021 |
A good (very) high level look at the problem of spying and warfare blurring together with the coming of the Internet (and computerisation in general). Contains zero technical content (like all BBC reporting) which really lets the book down. I'm sure the intent was to make the book accessible but other books manage this by explaining technical issues, not by completely ignoring them. It also suffers from time compression of the past as the author quickly catches up to modern times making this less of a history book and more a contemporary report.

If you compare it to Code Warriors by Stephen Budiansky this comes up really thin and light on the historical and technical content. If you were to pick one go for that instead. ( )
  Paul_S | Dec 23, 2020 |
Mostrando 3 de 3
sin reseñas | añadir una reseña
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Primeras palabras
Citas
Últimas palabras
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés

Ninguno

Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace. The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket.

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (4.43)
0.5
1
1.5
2
2.5
3 1
3.5
4 2
4.5
5 4

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 205,165,496 libros! | Barra superior: Siempre visible