Kingpin

The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network

Author: Kevin Poulsen

Publisher: Hachette UK

ISBN: 0733628389

Category: Biography & Autobiography

Page: 352

View: 3898

DOWNLOAD NOW »
The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network. The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses. Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

Kingpin

How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Author: Kevin Poulsen

Publisher: Broadway Books

ISBN: 0307588696

Category: Technology & Engineering

Page: 266

View: 7366

DOWNLOAD NOW »
Documents how a troubled young computer hacker seized control of a massive international computer fraud network in 2006, tracing the efforts of FBI and Secret Service agents as well as an undercover operator to locate and arrest him. Reprint.

Fatal System Error

The Hunt for the New Crime Lords Who are Bringing Down the Internet

Author: Joseph Menn

Publisher: ReadHowYouWant.com

ISBN: 1458716643

Category: Computer crimes

Page: 456

View: 8628

DOWNLOAD NOW »
In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought-and why the Internet might not survive.

The Cuckoo's Egg

Tracking a Spy Through the Maze of Computer Espionage

Author: Cliff Stoll

Publisher: Simon and Schuster

ISBN: 1416507787

Category: Biography & Autobiography

Page: 399

View: 5974

DOWNLOAD NOW »
The first true account of computer espionage tells of a year-long single-handed hunt for a computer thief who sold information from American computer files to Soviet intelligence agents

Worm

The First Digital World War

Author: Mark Bowden

Publisher: Atlantic Books Ltd

ISBN: 1611859956

Category: Computers

Page: 300

View: 2786

DOWNLOAD NOW »
Worm is the gripping story of the 'Conficker' virus- which, since its introduction in November 2008, has infected millions of computers around the world - and the cyber security elites who have joined forces in a high-tech game of cops and robbers to find its creators and defeat them. This dramatic cybercrime story travels from the Ukraine to the United States (and all parts in between) to explore the next frontier in terrorism. It is the story of a dazzling battle of wits over the future of the Internet. In Worm, Mark Bowden delivers an unputdownable account of the ongoing and largely unreported war taking place literally beneath our fingertips.

Hackers

Heroes of the Computer Revolution - 25th Anniversary Edition

Author: Steven Levy

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449393748

Category: Computers

Page: 520

View: 5298

DOWNLOAD NOW »
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers. Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

The Art of Intrusion

The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Author: Kevin D. Mitnick,William L. Simon

Publisher: John Wiley & Sons

ISBN: 9780470503829

Category: Computers

Page: 288

View: 825

DOWNLOAD NOW »
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

A Hacker Manifesto

Author: McKenzie Wark

Publisher: Harvard University Press

ISBN: 0674044843

Category: Computers

Page: 208

View: 9238

DOWNLOAD NOW »
A double is haunting the world--the double of abstraction, the virtual reality of information, programming or poetry, math or music, curves or colorings upon which the fortunes of states and armies, companies and communities now depend. The bold aim of this book is to make manifest the origins, purpose, and interests of the emerging class responsible for making this new world--for producing the new concepts, new perceptions, and new sensations out of the stuff of raw data. "A Hacker Manifesto" deftly defines the fraught territory between the ever more strident demands by drug and media companies for protection of their patents and copyrights and the pervasive popular culture of file sharing and pirating. This vexed ground, the realm of so-called "intellectual property," gives rise to a whole new kind of class conflict, one that pits the creators of information--the hacker class of researchers and authors, artists and biologists, chemists and musicians, philosophers and programmers--against a possessing class who would monopolize what the hacker produces. Drawing in equal measure on Guy Debord and Gilles Deleuze, "A Hacker Manifesto" offers a systematic restatement of Marxist thought for the age of cyberspace and globalization. In the widespread revolt against commodified information, McKenzie Wark sees a utopian promise, beyond the property form, and a new progressive class, the hacker class, who voice a shared interest in a new information commons.

American Kingpin

The Epic Hunt for the Criminal Mastermind Behind the Silk Road

Author: Nick Bilton

Publisher: Penguin

ISBN: 0698405730

Category: True Crime

Page: 304

View: 2663

DOWNLOAD NOW »
NEW YORK TIMES BESTSELLER. The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye. It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists and black hat hackers—could buy and sell contraband detection-free. Spurred by a public outcry, the federal government launched an epic two-year manhunt for the site’s elusive proprietor, with no leads, no witnesses, and no clear jurisdiction. All the investigators knew was that whoever was running the site called himself the Dread Pirate Roberts. The Silk Road quickly ballooned into $1.2 billion enterprise, and Ross embraced his new role as kingpin. He enlisted a loyal crew of allies in high and low places, all as addicted to the danger and thrill of running an illegal marketplace as their customers were to the heroin they sold. Through his network he got wind of the target on his back and took drastic steps to protect himself—including ordering a hit on a former employee. As Ross made plans to disappear forever, the Feds raced against the clock to catch a man they weren’t sure even existed, searching for a needle in the haystack of the global Internet. Drawing on exclusive access to key players and two billion digital words and images Ross left behind, Vanity Fair correspondent and New York Times bestselling author Nick Bilton offers a tale filled with twists and turns, lucky breaks and unbelievable close calls. It’s a story of the boy next door’s ambition gone criminal, spurred on by the clash between the new world of libertarian-leaning, anonymous, decentralized Web advocates and the old world of government control, order, and the rule of law. Filled with unforgettable characters and capped by an astonishing climax, American Kingpin might be dismissed as too outrageous for fiction. But it’s all too real.

DarkMarket

Cyberthieves, Cybercops and You

Author: Misha Glenny

Publisher: Random House

ISBN: 1847921264

Category: Computer crimes

Page: 296

View: 779

DOWNLOAD NOW »
* The benefits of living in a digital, globalised society are enormous; so too are the dangers. * The world has become a law enforcer's nightmare and every criminal's dream. We bank online, shop online, date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security - sharing our thoughts, beliefs and the details of our daily lives with anyone who cares to relieve us of them? * In this fascinating and compelling book, Misha Glenny, author of the international bestseller McMafia, explores the three fundamental threats facing us in the 21st century: cyber crime, cyber warfare and cyber industrial espionage. Governments and the private sector are losing billions of dollars each year, fighting an ever-morphing, often invisible, often super-smart new breed of criminal: the hacker. * Glenny has travelled and trawled the world. And by exploring the rise and fall of the criminal website, DarkMarket, he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe or Agent Keith Mularski in Pittsburgh, Glenny has tracked down and interviewed all the players - the criminals, the geeks, the police, the security experts and the victims - and he places everyone and everything in a rich brew of politics, economics and history. * The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.

We Are Anonymous

Author: Parmy Olson

Publisher: Random House

ISBN: 1448136156

Category: True Crime

Page: 528

View: 8211

DOWNLOAD NOW »
In January 2012, the hacker collective Anonymous brought down the FBI website in response to planned American laws against internet piracy. In 2011, LulzSec, a sister organisation, broke into and blocked computer systems at VISA, Mastercard and PayPal. The groups have infiltrated the networks of totalitarian governments in Libya and Tunisia. They have attacked the CIA and NATO. But instead of being sanctimonious and secretive, these cyber activists are flippant and taunting, never hesitating to mock those they've outsmarted. Today, governments, big businesses and social activists are waking up to the true power of the internet, and how it can be manipulated. This is the story of a hive mind, with many hackers across the globe connected to slice through security systems and escape untraced. Through the stories of four key members, We Are Anonymous offers a gripping, adrenalin-fuelled narrative drawing upon extensive research, and hundreds of conversations with the hackers themselves. By coming to know them - their backgrounds, families, motivations - we come to know the human side of their virtual exploits, showing exactly why they're so passionate about disrupting the internet's frontiers.

Cyber Security Essentials

Author: James Graham,Ryan Olson,Rick Howard

Publisher: CRC Press

ISBN: 9781439851265

Category: Business & Economics

Page: 342

View: 3484

DOWNLOAD NOW »
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

The Code War

America's Battles Against Russia and the Rising Global Cyber Threat

Author: John P. Carlin

Publisher: PublicAffairs

ISBN: 9781541773837

Category: Computers

Page: 464

View: 4745

DOWNLOAD NOW »
This firsthand account of the fight to protect America from foreign hackers warns of the unprecedented danger that awaits us in the era of the internet of things, unless we can change our technology culture. With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed. The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.

Spam Nation

The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

Author: Brian Krebs

Publisher: Sourcebooks, Inc.

ISBN: 1402295634

Category: Political Science

Page: 256

View: 8891

DOWNLOAD NOW »
Now a New York Times bestseller! There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life. In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere. Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma"-who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords-Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets. Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can-and do-hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too. Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime-before it's too late. "Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals... His track record of scoops...has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." -Bloomberg Businessweek

Cyber War

The Next Threat to National Security and What to Do About It

Author: Richard A. Clarke,Robert Knake

Publisher: Ecco

ISBN: 9780061962240

Category: Political Science

Page: 320

View: 3826

DOWNLOAD NOW »
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security—and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. This is the first book about the war of the future—cyber war—and a convincing argument that we may already be in peril of losing it.

LEGO MINDSTORMS NXT

The Mayan Adventure

Author: James Floyd Kelly

Publisher: Apress

ISBN: 9781430203629

Category: Computers

Page: 336

View: 6243

DOWNLOAD NOW »
Through the use of a fictional story, this book details how to build and design robots. Max, the story's main character, is part of an archaeological expedition investigating a newly discovered Mayan pyramid. During the expedition, the team encounters various problems, each solved with the help of a unique robot that Max creates using the Lego Mindstorms NXT kit. Although the book reveals possible robotic solutions and offers detailed information on how to build and program each robot, readers are encouraged to come up with their own. The book includes complete building theory information and provides worksheets for brainstorming.

Dr. Feelgood

The Shocking Story of the Doctor Who May Have Changed History by Treating and Drugging JFK, Marilyn, Elvis, and Other Prominent Figures

Author: Richard A. Lertzman,William J. Birnes

Publisher: Regnery Publishing

ISBN: 1626363358

Category: Biography & Autobiography

Page: 208

View: 1505

DOWNLOAD NOW »
Doctor Max Jacobson, whom the Secret Service under President John F. Kennedy code-named “Dr. Feelgood,” developed a unique “energy formula” that altered the paths of some of the twentieth century’s most iconic figures, including President and Jackie Kennedy, Marilyn Monroe, Frank Sinatra, and Elvis. JFK received his first injection (a special mix of “vitamins and hormones,” according to Jacobson) just before his first debate with Vice President Richard Nixon. The shot into JFK’s throat not only cured his laryngitis, but also diminished the pain in his back, allowed him to stand up straighter, and invigorated the tired candidate. Kennedy demolished Nixon in that first debate and turned a tide of skepticism about Kennedy into an audience that appreciated his energy and crispness. What JFK didn’t know then was that the injections were actually powerful doses of a combination of highly addictive liquid methamphetamine and steroids. Author and researcher Rick Lertzman and New York Times bestselling author Bill Birnes reveal heretofore unpublished material about the mysterious Dr. Feelgood. Through well-researched prose and interviews with celebrities including George Clooney, Jerry Lewis, Yogi Berra, and Sid Caesar, the authors reveal Jacobson’s vast influence on events such as the assassination of JFK, the Cuban Missile Crisis, the Kennedy-Khrushchev Vienna Summit, the murder of Marilyn Monroe, the filming of the C. B. DeMille classic The Ten Commandments, and the work of many of the great artists of that era. Jacobson destroyed the lives of several famous patients in the entertainment industry and accidentally killed his own wife, Nina, with an overdose of his formula.

The Phoenix Project

A Novel About IT, DevOps, and Helping Your Business Win

Author: Gene Kim,Kevin Behr,Kim Spafford

Publisher: IT Revolution

ISBN: 0988262584

Category: Business & Economics

Page: 348

View: 5666

DOWNLOAD NOW »
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited. In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.

Countdown to Zero Day

Stuxnet and the Launch of the World's First Digital Weapon

Author: Kim Zetter

Publisher: Crown

ISBN: 0770436188

Category: History

Page: 448

View: 3778

DOWNLOAD NOW »
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.