9781681771540 |
1681771543 |
Available:*
Library | Material Type | Call Number | Shelf Location | Status | Item Holds |
---|---|---|---|---|---|
Searching... East Library | Book | 327.120854 CORE | Nonfiction | Searching... Unknown | Searching... Unavailable |
Bound With These Titles
On Order
Summary
Summary
As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all.Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
Reviews (4)
Publisher's Weekly Review
BBC security correspondent Corera's dense and comprehensive history of electronic and computer espionage includes many hitherto secret tales from the world of communication intelligence. Corera (The Art of Betrayal) examines the close cooperation between the British and American government intelligence agencies from the days of Bletchley Park during WWII, when the alliance began, to its current standing at the center of political debate on questions of national security and global enterprise. The narrative is focused on people and events, with perhaps too-scant descriptions of methods and hardware. Gordon discusses the role of computers and the Internet in the ever-changing balance between the conflicting needs of personal and corporate privacy and the fight against external enemies: first the Soviet Union, and now global terrorism. The world of hackers and their motives and methods, and the uses of hacking as an aid and a threat to cybersecurity, are examined in fascinating detail, illustrated with alarming anecdotes. The discussion of Stuxnet-the sophisticated attack on Iranian centrifuges-and its aftermath is compelling, as Corera's chilling conclusion contextualizes it as the first of a continuing and increasingly sophisticated form of international, sometimes state-sponsored digital warfare. Agent: Georgina Capel, Georgina Capel Associates (U.K.). (July) © Copyright PWxyz, LLC. All rights reserved.
Booklist Review
The computer was born to spy, writes technology journalist Corera in this century-spanning history of cyberespionage and the tools that have made it possible. The roots of modern cryptanalysis reach back to WWII at England's Bletchley Park, where Alan Turing's famous Enigma-breaking work and the development of the Colossus computer (top secret until the 1970s) aided the eventual Allied victory. Corera likens the code-breaking alliance between the U.S. and Britain during the war as a brief affair that soon evolved into a marriage as the Cold War with the Soviet Union ushered in a new era of high-stakes cyberwarfare and John Le Carré-esque espionage. Then and now, cryptanalysis aims to find the pattern within the seemingly random, the sliver of order within the chaos. Touching on the NSA, encryption, Chinese censorship, and the emergence of sophisticated hackers, the book will pique readers interested in the geopolitical ramifications of surveillance and the complex relationship between security and privacy in our post-9/11, post-Snowden world.--Comello, Chad Copyright 2016 Booklist
Choice Review
Corera (BBC News) shows that code breaking was an important driver in the development of the computer. Paradoxically, he also shows that the development of computer technology has made breaking codes ever more difficult, as encryption has escaped from the hands of governments into the hands of the private sector. At the same time, computer technology has led to the explosion of data, which has made isolating signals from noise ever more difficult for spy agencies. The result is that spy agencies are in a hamster wheel of needing ever higher levels of computer capability to break codes, which makes encryption even easier for enemies. The text is very readable, relying on narratives about individuals who have been important in code breaking, computer development, etc. This reliance is also a weakness because larger issues sometimes get lost. There is also the occasional error in describing or defining important terms, such as computer virus or worm. Despite these weaknesses, the text is recommended for anyone who wants a general history of code breaking, the development of cyber espionage, and the special relationship that exists between the US and UK in intelligence sharing. Summing Up: Highly recommended. Upper-division undergraduates through professionals. --Kevin Buterbaugh, Southern Connecticut State University
Library Journal Review
Corera (The Art of Betrayal), a security correspondent for BBC News, traces electronic espionage from World War II to the present, focusing on the UK and the United States, with Russia and China as their primary adversaries. He explores how England and America's differing policies on commercial enterprises, domestic surveillance, and transparency have influenced their tactics and capabilities through the Cold War to modern threats of terrorism. Espionage no longer focuses on code breaking but has become a matter of sifting through big data to find patterns in the traffic of code as important as the contents of its message. Sophisticated encryption became public, where it abets criminals and protects dissidents. An increasingly networked world means that cyberspies can wreak physical and financial havoc on critical infrastructure systems. Though Corera concentrates on the actions of governments, he covers not only classic espionage for military or diplomacy purposes but also corporate espionage, especially in jurisdictions with state-owned companies. A comparable analysis of recent history can be found in Adam Segal's The Hacked World Order. VERDICT Corera's illuminating summary of cyberespionage's development and potential effects on modern statecraft, war, commerce, and everyday liberties will appeal to all readers interested in those topics.-Wade M. Lee, Univ. of Toledo Lib. © Copyright 2016. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
Table of Contents
Prologue | p. 1 |
Introduction | p. 8 |
1 Birth | p. 17 |
2 Marriage | p. 38 |
3 Into the Cold | p. 53 |
4 Coming of Age | p. 67 |
5 Spy-hunting | p. 89 |
6 Crypto Wars | p. 103 |
7 Attack | p. 134 |
8 Enter the KGB | p. 146 |
9 Out of the Cold and into Cyberspace | p. 158 |
10 Titan Rain | p. 176 |
11 In the Wires | p. 202 |
12 Britain and the Cyber Spies | p. 225 |
13 Dissent | p. 250 |
14 Sabotage | p. 272 |
15 The Lights Go Off | p. 289 |
16 Rebirth - Cables | p. 305 |
17 Britain | p. 331 |
18 Exposure | p. 350 |
Epilogue: To Infinity and Beyond | p. 382 |
Acknowledgements | p. 392 |
Notes | p. 393 |
Index | p. 421 |