Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Cyberspies

ebook
1 of 1 copy available
1 of 1 copy available
As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all.Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Reviews

    • Publisher's Weekly

      May 16, 2016
      BBC security correspondent Corera’s dense and comprehensive history of electronic and computer espionage includes many hitherto secret tales from the world of communication intelligence. Corera (The Art of Betrayal) examines the close cooperation between the British and American government intelligence agencies from the days of Bletchley Park during WWII, when the alliance began, to its current standing at the center of political debate on questions of national security and global enterprise. The narrative is focused on people and events, with perhaps too-scant descriptions of methods and hardware. Gordon discusses the role of computers and the Internet in the ever-changing balance between the conflicting needs of personal and corporate privacy and the fight against external enemies: first the Soviet Union, and now global terrorism. The world of hackers and their motives and methods, and the uses of hacking as an aid and a threat to cybersecurity, are examined in fascinating detail, illustrated with alarming anecdotes. The discussion of Stuxnet—the sophisticated attack on Iranian centrifuges—and its aftermath is compelling, as Corera’s chilling conclusion contextualizes it as the first of a continuing and increasingly sophisticated form of international, sometimes state-sponsored digital warfare. Agent: Georgina Capel, Georgina Capel Associates (U.K.).

    • Kirkus

      May 1, 2016
      The history of cyberespionage, combining "related stories like encryption and code-breaking [and] the rise of the computer industry and its complex relationship with the secret world."In 1944, the first programmable electronic computer began operation in Britain's Bletchley Park. Built to decipher German codes, it performed brilliantly. Computers remain essential to espionage and other dubious activities, writes BBC security correspondent Corera (The Art of Betrayal: The Secret History of MI6: Life and Death in the British Secret Service, 2013, etc.) in this engrossing history of the dark side of the information revolution. By the end of the Cold War, technical advances enabled hackers and spies to steal "data at rest" inside a computer rather than struggle to intercept "data in motion" traveling from one place to another. In response, and also to detect the activity of terrorists, security organizations such as the National Security Agency sweep up immense quantities of information, including that of their own citizens, and filter it for suspicious activity. No one designed operating systems for security. In the 1980s, when experts discovered how easily hackers could penetrate computers, they began designing patches, firewalls, and other defenses. However, "it was not possible to retrofit security," so no system is immune to intrusion, theft, and damage. Some attacks, such as the Stuxnet virus, which destroyed Iran's uranium centrifuges, resemble acts of war, and there is no doubt that in future wars, "alongside tanks, missiles, and guns there would be viruses, worms, logic bombs, trapdoors and Trojan horses." This book was originally published in England, so Americans will encounter unfamiliar acronyms and an emphasis on Britain's experience, but Corera casts his net widely and makes it clear that America is the leader in the battle, as well as the most vulnerable. A convincing argument that the most secure way to communicate is via snail mail.

      COPYRIGHT(2016) Kirkus Reviews, ALL RIGHTS RESERVED.

    • Library Journal

      June 1, 2016

      Corera (The Art of Betrayal), a security correspondent for BBC News, traces electronic espionage from World War II to the present, focusing on the UK and the United States, with Russia and China as their primary adversaries. He explores how England and America's differing policies on commercial enterprises, domestic surveillance, and transparency have influenced their tactics and capabilities through the Cold War to modern threats of terrorism. Espionage no longer focuses on code breaking but has become a matter of sifting through big data to find patterns in the traffic of code as important as the contents of its message. Sophisticated encryption became public, where it abets criminals and protects dissidents. An increasingly networked world means that cyberspies can wreak physical and financial havoc on critical infrastructure systems. Though Corera concentrates on the actions of governments, he covers not only classic espionage for military or diplomacy purposes but also corporate espionage, especially in jurisdictions with state-owned companies. A comparable analysis of recent history can be found in Adam Segal's The Hacked World Order. VERDICT Corera's illuminating summary of cyberespionage's development and potential effects on modern statecraft, war, commerce, and everyday liberties will appeal to all readers interested in those topics.--Wade M. Lee, Univ. of Toledo Lib.

      Copyright 2016 Library Journal, LLC Used with permission.

Formats

  • OverDrive Read
  • EPUB ebook

Languages

  • English

Loading
Check out what's being checked out right now This service is made possible by the local automated network, member libraries, and the Massachusetts Board of Library Commissioners with funding from the Institute of Museum and Library Services and the Commonwealth of Massachusetts.