Cyberspies : the secret history of surveillance, hacking, and digital espionage /

Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.

Saved in:
Bibliographic Details
Main Author: Corera, Gordon (Author)
Format: Book
Language:English
Published: New York : Pegasus Books, 2016.
Edition:First Pegasus books hardcover edition.
Subjects:
LEADER 03555cam a2200517 i 4500
001 mig00004761712
003 OCoLC
005 20171018125040.0
007 ta
008 170124t20162015nyu b 001 0 eng d
010 |a  2016498084 
019 |a 961282553  |a 962189702  |a 967327829  |a 968162802  |a 974744727 
020 |a 9781681771540 
020 |a 1681771543 
035 |a (OCoLC)923794325  |z (OCoLC)961282553  |z (OCoLC)962189702  |z (OCoLC)967327829  |z (OCoLC)968162802  |z (OCoLC)974744727 
035 0 0 |a ocn923794325 
037 |a 1406633  |b QBI 
040 |a BTCTA  |b eng  |e rda  |c DLC  |d BTCTA  |d YDXCP  |d BDX  |d HQD  |d CDX  |d BKL  |d MOF  |d FM0  |d LIV  |d ON8  |d QBX  |d BUR  |d OCLCF  |d UAB  |d ILC  |d VP@  |d A7U  |d OCLCQ  |d TXSCH  |d TXM 
042 |a lccopycat 
049 |a TXMM 
050 0 0 |a HV6773  |b .C66 2016 
082 0 4 |a 327.120285/4678  |2 23 
092 |a 327.12  |b C81c  
100 1 |a Corera, Gordon,  |e author. 
245 1 0 |a Cyberspies :  |b the secret history of surveillance, hacking, and digital espionage /  |c Gordon Corera. 
246 1 4 |a Cyber spies 
250 |a First Pegasus books hardcover edition. 
264 1 |a New York :  |b Pegasus Books,  |c 2016. 
300 |a xi, 431 pages ;  |c 23 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references (pages 393-420) and index. 
505 0 |a Birth -- Marriage -- Into the cold -- Coming of age -- Spy-hunting -- Crypto wars -- Attack -- Enter the KGB -- Out of the cold and into cyberspace -- Titan rain -- In the wires -- Britain and the cyber spies -- Dissent -- Sabotage -- The lights go off -- Rebirth: cables -- Britain -- Exposure -- Epilogue: To infinity and beyond. 
520 |a Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace. 
520 |a The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Internet in espionage. 
650 0 |a Data protection. 
650 0 |a Computer networks  |x Security measures. 
907 |a 3568259  |b 10-18-17  |c 07-07-17 
998 |a w  |b 10-18-17  |c m  |d a   |e -  |f eng  |g nyu  |h 0  |i 1 
994 |a C0  |b TXM 
945 |a 327.12  |b C81c  |g 1  |i 33082018136597  |j 0  |l w3   |o -  |p $20.36  |q -  |r -  |s -   |t 0  |u 0  |v 0  |w 0  |x 0  |y .i21639048  |z 07-07-17 
999 f f |i 6a63475c-18b6-4255-a0e1-419587a5ef6a  |s 93db20cf-a738-44c9-bb01-8146f9189911 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Main Collection - Walker Library - 3rd Floor  |e 327.12 C81c  |h Library of Congress classification  |i Book  |m 33082018136597  |n 1