EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Hunting Cyber Criminals

Download or read book Hunting Cyber Criminals written by Vinny Troia and published by John Wiley & Sons. This book was released on 2020-02-11 with total page 544 pages. Available in PDF, EPUB and Kindle. Book excerpt: The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book’s unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for: Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization’s data.

Book Hunting Cyber Criminals

Download or read book Hunting Cyber Criminals written by Vinny Troia and published by John Wiley & Sons. This book was released on 2020-01-28 with total page 705 pages. Available in PDF, EPUB and Kindle. Book excerpt: The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book’s unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for: Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization’s data.

Book Hunting LeRoux

    Book Details:
  • Author : Elaine Shannon
  • Publisher : HarperCollins
  • Release : 2019-02-19
  • ISBN : 0062859153
  • Pages : 437 pages

Download or read book Hunting LeRoux written by Elaine Shannon and published by HarperCollins. This book was released on 2019-02-19 with total page 437 pages. Available in PDF, EPUB and Kindle. Book excerpt: With a foreword by four-time Oscar nominated filmmaker Michael Mann. The story of Paul LeRoux, the twisted-genius entrepreneur and cold-blooded killer who brought revolutionary innovation to international crime, and the exclusive inside story of how the DEA’s elite, secretive 960 Group brought him down. Paul LeRoux was born in Zimbabwe and raised in South Africa. After a first career as a pioneering cybersecurity entrepreneur, he plunged hellbent into the dark side, using his extraordinary talents to develop a disruptive new business model for transnational organized crime. Along the way he created a mercenary force of ex-U.S. and NATO sharpshooters to carry out contract murders for his own pleasure and profit. The criminal empire he built was Cartel 4.0, utilizing the gig economy and the tools of the Digital Age: encrypted mobile devices, cloud sharing and novel money-laundering techniques. LeRoux’s businesses, cyber-linked by his own dark worldwide web, stretched from Southeast Asia across the Middle East and Africa to Brazil; they generated hundreds of millions of dollars in sales of arms, drugs, chemicals, bombs, missile technology and murder. He dealt with rogue nations—Iran and North Korea—as well as the Chinese Triads, Somali pirates, Serb mafia, outlaw bikers, militants, corrupt African and Asian officials and coup-plotters. Initially, LeRoux appeared as a ghost image on law enforcement and intelligence radar, an inexplicable presence in the middle of a variety of criminal endeavors. He was Netflix to Blockbuster, Spotify to Tower Records. A bold disruptor, his methods brought international crime into the age of innovation, making his operations barely detectable and LeRoux nearly invisible. But he gained the attention of a small band of bold, unorthodox DEA agents, whose brief was tracking down drugs-and-arms trafficking kingpins who contributed to war and global instability. The 960 Group, an element of the DEA’s Special Operations Division, had launched some of the most complex, coordinated and dangerous operations in the agency’s history. They used unorthodox methods and undercover informants to penetrate LeRoux’s inner circle and bring him down. For five years Elaine Shannon immersed herself in LeRoux’s shadowy world. She gained exclusive access to the agents and players, including undercover operatives who looked LeRoux in the eye on a daily basis. Shannon takes us on a shocking tour of this dark frontier, going deep into the operations and the mind of a singularly visionary and frightening figure—Escobar and Victor Bout along with the innovative vision of Steve Jobs rolled into one. She puts you in the room with these people and their moment-to-moment encounters, jeopardy, frustration, anger and small victories, creating a narrative with a breath-taking edge, immediacy and a stranger-than-fiction reality. Remarkable, disturbing, and utterly engrossing, Hunting LeRouxintroduces a new breed of criminal spawned by the savage, greed-exalting underside of the Age of Innovation—and a new kind of true crime story. It is a look into the future—a future that is dark.

Book Practical Threat Intelligence and Data Driven Threat Hunting

Download or read book Practical Threat Intelligence and Data Driven Threat Hunting written by Valentina Costa-Gazcón and published by Packt Publishing Ltd. This book was released on 2021-02-12 with total page 398 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting Carry out atomic hunts to start the threat hunting process and understand the environment Perform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasets Book DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business. This book is not only an introduction for those who don’t know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch. You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you’ll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework. By the end of this book, you’ll have the skills you need to be able to carry out effective hunts in your own environment.What you will learn Understand what CTI is, its key concepts, and how it is useful for preventing threats and protecting your organization Explore the different stages of the TH process Model the data collected and understand how to document the findings Simulate threat actor activity in a lab environment Use the information collected to detect breaches and validate the results of your queries Use documentation and strategies to communicate processes to senior management and the wider business Who this book is for If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.

Book The Cuckoo s Egg

Download or read book The Cuckoo s Egg written by Cliff Stoll and published by Simon and Schuster. This book was released on 2024-07-02 with total page 432 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB. When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information. Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.

Book The Art of Cyberwarfare

Download or read book The Art of Cyberwarfare written by Jon DiMaggio and published by No Starch Press. This book was released on 2022-04-26 with total page 274 pages. Available in PDF, EPUB and Kindle. Book excerpt: A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors. The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers’ techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of: North Korea’s series of cyber attacks against financial institutions, which resulted in billions of dollars stolen The world of targeted ransomware attacks, which have leveraged nation state tactics to cripple entire corporate enterprises with ransomware Recent cyber attacks aimed at disrupting or influencing national elections globally The book’s second part walks through how defenders can track and attribute future attacks. You’ll be provided with the tools, methods, and analytical guidance required to dissect and research each stage of an attack campaign. Here, Jon DiMaggio demonstrates some of the real techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among many other advanced threats. He now offers his experience to train the next generation of expert analysts.

Book Electronic Tribes

    Book Details:
  • Author : Tyrone L. Adams
  • Publisher : University of Texas Press
  • Release : 2008-06
  • ISBN : 0292717741
  • Pages : 333 pages

Download or read book Electronic Tribes written by Tyrone L. Adams and published by University of Texas Press. This book was released on 2008-06 with total page 333 pages. Available in PDF, EPUB and Kindle. Book excerpt: From MySpace.com to Nigerian e-mail scams, sixteen competitively selected essays inquire into the causes and consequences of the "tribes" that are facilitated by the Internet.

Book The Pentester BluePrint

    Book Details:
  • Author : Phillip L. Wylie
  • Publisher : John Wiley & Sons
  • Release : 2020-10-27
  • ISBN : 1119684374
  • Pages : 192 pages

Download or read book The Pentester BluePrint written by Phillip L. Wylie and published by John Wiley & Sons. This book was released on 2020-10-27 with total page 192 pages. Available in PDF, EPUB and Kindle. Book excerpt: JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Book Cybercrime Investigations

Download or read book Cybercrime Investigations written by John Bandler and published by CRC Press. This book was released on 2020-06-22 with total page 406 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.

Book This Is How They Tell Me the World Ends

Download or read book This Is How They Tell Me the World Ends written by Nicole Perlroth and published by Bloomsbury Publishing. This book was released on 2021-02-18 with total page 529 pages. Available in PDF, EPUB and Kindle. Book excerpt: WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying exposé' The Times 'Part John le Carré . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable. Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Book The Economics of Information Security and Privacy

Download or read book The Economics of Information Security and Privacy written by Rainer Böhme and published by Springer Science & Business Media. This book was released on 2013-11-29 with total page 327 pages. Available in PDF, EPUB and Kindle. Book excerpt: In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.

Book Practical Cyber Intelligence

Download or read book Practical Cyber Intelligence written by Wilson Bautista and published by Packt Publishing Ltd. This book was released on 2018-03-29 with total page 304 pages. Available in PDF, EPUB and Kindle. Book excerpt: Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. Key Features Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to go about building intelligent teams Book Description Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework. Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book. By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence. What you will learn Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security Understand tactical view of Active defense concepts and their application in today's threat landscape Get acquainted with an operational view of the F3EAD process to drive decision making within an organization Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence Who this book is for This book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented.

Book Cybersecurity and Decision Makers

Download or read book Cybersecurity and Decision Makers written by Marie De Fréminville and published by John Wiley & Sons. This book was released on 2020-06-03 with total page 228 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Book Hacking Multifactor Authentication

Download or read book Hacking Multifactor Authentication written by Roger A. Grimes and published by John Wiley & Sons. This book was released on 2020-09-28 with total page 576 pages. Available in PDF, EPUB and Kindle. Book excerpt: Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.

Book The Mastermind

    Book Details:
  • Author : Evan Ratliff
  • Publisher : Random House
  • Release : 2019-01-29
  • ISBN : 0399590420
  • Pages : 480 pages

Download or read book The Mastermind written by Evan Ratliff and published by Random House. This book was released on 2019-01-29 with total page 480 pages. Available in PDF, EPUB and Kindle. Book excerpt: The incredible true story of the decade-long quest to bring down Paul Le Roux—the creator of a frighteningly powerful Internet-enabled cartel who merged the ruthlessness of a drug lord with the technological savvy of a Silicon Valley entrepreneur. “A tour de force of shoe-leather reporting—undertaken, amid threats and menacing, at considerable personal risk.”—Los Angeles Times NAMED ONE OF THE BEST BOOKS OF THE YEAR BY The New York Times Book Review • NPR • Evening Standard • Kirkus Reviews It all started as an online prescription drug network, supplying hundreds of millions of dollars’ worth of painkillers to American customers. It would not stop there. Before long, the business had turned into a sprawling multinational conglomerate engaged in almost every conceivable aspect of criminal mayhem. Yachts carrying $100 million in cocaine. Safe houses in Hong Kong filled with gold bars. Shipments of methamphetamine from North Korea. Weapons deals with Iran. Mercenary armies in Somalia. Teams of hit men in the Philippines. Encryption programs so advanced that the government could not break them. The man behind it all, pulling the strings from a laptop in Manila, was Paul Calder Le Roux—a reclusive programmer turned criminal genius who could only exist in the networked world of the twenty-first century, and the kind of self-made crime boss that American law enforcement had never imagined. For half a decade, DEA agents played a global game of cat-and-mouse with Le Roux as he left terror and chaos in his wake. Each time they came close, he would slip away. It would take relentless investigative work, and a shocking betrayal from within his organization, to catch him. And when he was finally caught, the story turned again, as Le Roux struck a deal to bring down his own organization and the people he had once employed. Award-winning investigative journalist Evan Ratliff spent four years piecing together this intricate puzzle, chasing Le Roux’s empire and his shadowy henchmen around the world, conducting hundreds of interviews and uncovering thousands of documents. The result is a riveting, unprecedented account of a crime boss built by and for the digital age. Praise for The Mastermind “The Mastermind is true crime at its most stark and vivid depiction. Evan Ratliff’s work is well done from beginning to end, paralleling his investigative work with the work of the many federal agents developing the case against LeRoux.”—San Francisco Book Review (five stars) “A wholly engrossing story that joins the worlds of El Chapo and Edward Snowden; both disturbing and memorable.”—Kirkus Reviews (starred review)

Book Hunting and Gathering

    Book Details:
  • Author : Brooke Berman
  • Publisher : Broadway Play Publishing
  • Release : 2009
  • ISBN : 9780881454055
  • Pages : 0 pages

Download or read book Hunting and Gathering written by Brooke Berman and published by Broadway Play Publishing. This book was released on 2009 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Four New Yorkers seek shelter, both physical and spiritual, in a variety of temporary abodes and in one another in this dark comedy. "As every young, single New Yorker quickly learns, real estate is destiny in this town, a fact of urban life that Brooke Berman addresses with bracing wit and intelligence in HUNTING AND GATHERING. The four attractive players in this droll comedy think of their fly-by-night housing accommodations as proof of an independent spirit. Little do they realize, until the scribe plays her romantic trump card, that their loose living conditions more accurately expose their fears of emotional commitment. Character insights are comic, but never cruel, revealed in clever dialogue and delivered in sharp style by a crackerjack cast. Comedy with a point ... Berman wastes no time exercising the satirical verbal wit that has already opened doors for her with savvy institutional theaters like Second Stage and Steppenwolf. Plot-wise, the play raises essentially the same concerns as any romantic comedy - who will end up with whom and why should we care? But in re-casting the old relationship questions as real-estate issues - who will move in with whom and what will be the price of this commitment? - Berman finds a fresh and funny way of looking at the mortal terrors of being young and on your own in a bewildering existential landscape." -Marilyn Stasio, Variety

Book Kingpin

    Book Details:
  • Author : Kevin Poulsen
  • Publisher : Crown
  • Release : 2012-02-07
  • ISBN : 0307588696
  • Pages : 290 pages

Download or read book Kingpin written by Kevin Poulsen and published by Crown. This book was released on 2012-02-07 with total page 290 pages. Available in PDF, EPUB and Kindle. Book excerpt: Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime. The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots. The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring. And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police. Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead. Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today. Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.