Buy Hack to The Future Book by Emily Crose - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Society and Social Sciences > Politics and government > International relations > Espionage and secret services > Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers
Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers

Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers


     0     
5
4
3
2
1



International Edition


X
About the Book

Understand the history of hacking culture and the genesis of a powerful modern subculture

In Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers, veteran information security professional Emily Crose delivers a deep dive into the history of the United States government's nuanced relationship with hacker culture and the role the latter has played in the former's domestic policy and geopolitics. In the book, you'll learn about significant events that have changed the way the hacking community has been perceived by the public, the state, and other hackers.

The author explains how the US government managed to weaponize a subculture widely seen as misanthropic and awkward into a lever of geopolitical power. You'll also discover how:

  • The release of the Morris worm and the Melissa virus changed the way hackers were seen and treated in the United States
  • Different government agencies, including the National Security Agency and NASA treated – and were treated by – domestic hackers
  • Hacking went from being an exclusive hobby for socially awkward nerds to a substantial lever of geopolitical power in just a few decades

Perfect for anyone with an interest in hacking, tech, infosec, and geopolitics, Hack to the Future is a must-read for those who seek to better their understanding of the history of hacking culture and how we got to where we are today.



Table of Contents:

Introduction xv

Part 1 The Pre-Broadband Era 1

Chapter 1 A Subculture Explained 3

Defining a Community 7

Common Hacking Virtues 8

Curiosity 8

Mischief 9

Defiance 10

Perseverance 10

Terms 11

Hackers and Secrecy 15

Summary 17

Chapter 2 Uncle Sam and Technology 19

World War I 21

Codebreaking 22

The Cold War 23

Foreign Intelligence 25

The INTs 26

Sigint 26

Comint 27

Humint 27

Central Intelligence Agency 28

Computer Scientists of Operation Paperclip 28

National Security Agency 30

Federal Bureau of Investigation 31

Advanced Research Projects Agency 32

The Development of ARPANET 32

ARPANET in Practice 34

Packet Switching 34

National Aeronautics and Space Administration 35

NASA Hackers 35

A Leak in the Walled Garden 38

Chapter 3 Commercializing Technology 39

Telephony 39

The Phone Phreakers 40

One Whistle to Rule Them All 44

Blue and Red Boxes 45

Rock Stars Are Born 47

The Missing Stair 49

The Personal Computer 50

Altair 8800 50

Apple I and II 51

Communities 52

Community Memory 52

Jude Milhon 54

Age of the Bulletin Board System 55

Party Lines 58

Chapter 4 Digital Disruption 61

Viral Genesis 64

Creeper and Reaper 65

Wabbits 67

Virus or Not? 69

Xerparc 70

Government in the 1970s 72

Law Enforcement 74

The ARPANET Spam Incident 78

Chapter 5 Hacker Rehabilitation 81

Dark Dante and the ARPANET Breach 82

The Los Alamos National Labs Breach 85

The 414s 87

Shaping the Hacker Image 89

Congressional Testimony 89

The Morris Worm 91

Legal Implications of Hacking 95

WANK and OILZ 96

Investigation 99

Hacktivism 100

Chapter 6 On the Other Side of The Wall 101

Soviet Intelligence 104

A “Closed Society” 106

Glasnost and Perestroika 106

Computers and Telecommunications 107

Soviet Phreaking 108

Building a Soviet Internet 110

Soviet Programming 112

Soviet Understanding of Hacking 113

Post-Soviet Russia 113

A New Class of Criminal 114

Chapter 7 Hackers of the World, Unite! 117

Project Cybersyn 118

Get Me Beer! 119

Building the Network 120

Operation Condor 121

Project Cybersyn’s Epitaph 122

Chaos Computer Club 123

Chaos Computer Club France 126

Building Teletext 128

The Prestel Hack 129

Overseas Cooperation 131

The Australian Scene 131

AFP Tracking of Realm 132

Chapter 8 Electronic Delinquents 135

Digital Spycraft 136

Protecting America’s Defense Networks 137

American Code Making 138

Church and Pike 139

The Rainbow Series 141

The Clipper Chip 142

Prosecuting the 414s 144

Hackers on Trial 145

Operation Sundevil 147

Sundevil Blowback 148

The Crypto Wars 150

Digital Bullets 151

Chapter 9 Hackers Go Mainstream 153

Computer Fraud and Abuse 154

Kevin “Dark Dante” Poulsen 155

Kevin “Condor” Mitnick 157

Fugitive Mitnick 157

Free Kevin 159

Fallout from the Arrests 159

Forging the Hacker Image 161

1960’s Movie Hackers 161

1980’s Movie Hackers 162

Falken’s Maze 163

Matthew Broderick 163

1990’s Movie Hackers 166

Hackers 167

Chapter 10 The DEF CON Effect 171

An Internet for Everyone 172

A Great Migration 174

Web Defacements 175

Y2k 176

Hacker Conferences 177

The Business of Hacking 180

Spot the Fed 182

Part 2 The Post-Broadband Era 189

Chapter 11 In from the Cold 191

Hackers Meet Congress 192

Development of the Red Team 195

Operation Cybersnare 196

Thinking About the Future 198

Evident Surprise and Eligible Receiver 201

Chapter 12 Anonymous 205

USA PATRIOT Act 207

Project Chanology 208

HBGary 212

Chapter 13 Spy vs. Spy 219

“Collateral Murder” 220

Chapter 14 Cybernetting Society 231

Consumer Electronics 232

A Politicized Internet 234

Global Instability 236

Arab Spring 237

Operation Tunisia 238

The Syrian Electronic Army 240

The Euromaidan Protests 245

Chapter 15 Hackers Unleashed 247

Solar Sunrise 248

Advanced Persistent Threat 250

Emergence of Chinese Hacking 254

American Elite 255

A New Domain 258

Chapter 16 Cyberwar 261

Operation Uphold Democracy 264

Cyberwarfare in Concept 266

Stuxnet 268

Combatant Hackers 270

Ukrainian Blackouts 273

Chapter 17 Politics As Usual 279

Memetic Warfare 281

Election Interference 283

Hacking Elections at DEF CON 287

Epilogue 291

Cisa 292

Pillar II 294

Cyberwarfare in the 2020s 296

The Way from Here 297

Acknowledgments 299

About the Author 301

Index 303



About the Author :

EMILY CROSE is a senior technical director at Sophos Labs. She works on Linux runtime threat detection and has over a decade’s experience in the field of information security. She served in the U.S. intelligence community for seven years before entering the private sector and is the co-founder of Hacking History, a project investigating the United States government’s handling of the hacking community.


Best Sellers


Product Details
  • ISBN-13: 9781394169825
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 231 mm
  • No of Pages: 336
  • Returnable: Y
  • Spine Width: 28 mm
  • Weight: 594 gr
  • ISBN-10: 1394169825
  • Publisher Date: 28 Nov 2024
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • Sub Title: How World Governments Relentlessly Pursue and Domesticate Hackers
  • Width: 160 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers
John Wiley & Sons Inc -
Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!