Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

by Gordon Corera

Narrated by Gildart Jackson

Unabridged — 17 hours, 54 minutes

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

by Gordon Corera

Narrated by Gildart Jackson

Unabridged — 17 hours, 54 minutes

Audiobook (Digital)

$20.42
(Not eligible for purchase using B&N Audiobooks Subscription credits)
$22.95 Save 11% Current price is $20.42, Original price is $22.95. You Save 11%.

Listen on the free Barnes & Noble NOOK app


Related collections and offers


Overview

The previously untold-and previously highly classified-story of the conflux of espionage and technology, a compelling narrative rich with astonishing revelations taking readers from World War II to the Internet age

As the digital era becomes increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all.

Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the United Kingdom, the United States, and China. Using unique access to the NSA, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes.

Cyberspies is a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.


Editorial Reviews

Publishers Weekly

05/16/2016
BBC security correspondent Corera’s dense and comprehensive history of electronic and computer espionage includes many hitherto secret tales from the world of communication intelligence. Corera (The Art of Betrayal) examines the close cooperation between the British and American government intelligence agencies from the days of Bletchley Park during WWII, when the alliance began, to its current standing at the center of political debate on questions of national security and global enterprise. The narrative is focused on people and events, with perhaps too-scant descriptions of methods and hardware. Gordon discusses the role of computers and the Internet in the ever-changing balance between the conflicting needs of personal and corporate privacy and the fight against external enemies: first the Soviet Union, and now global terrorism. The world of hackers and their motives and methods, and the uses of hacking as an aid and a threat to cybersecurity, are examined in fascinating detail, illustrated with alarming anecdotes. The discussion of Stuxnet—the sophisticated attack on Iranian centrifuges—and its aftermath is compelling, as Corera’s chilling conclusion contextualizes it as the first of a continuing and increasingly sophisticated form of international, sometimes state-sponsored digital warfare. Agent: Georgina Capel, Georgina Capel Associates (U.K.). (July)

The Sunday Times (London)

"Riveting. Making use of excellent sources, Corera has produced a highly relevant read that addresses the key debate in intelligence gathering—the balance between privacy and security."

The Guardian

"If you are looking for a clear and comprehensive guide to how communications have been intercepted, from cable-cutting in the First World War to bulk data collection exposed by Ed Snowden, this is it."

PopMatters

"There are many stories densely packed throughout Cyberspies. The book successfully zig zags through different countries, laws, and politics while maintaining its central theme."

The Observer (London)

"What good timing for this book. Gordon Corera’s book takes us through the labyrinth of cyber-espionage. It concerns a psychosis of control, whereby the digitization of spying infests every cranny of our lives."

Booklist

"A century-spanning history of cyberespionage and the tools that have made it possible. Touching on the NSA, encryption, Chinese censorship, and the emergence of sophisticated hackers, the book will pique readers interested in the geopolitical ramifications of surveillance and the complex relationship between security and privacy in our post-9/11, post-Snowden world."

Providence Journal

"An exhaustive account by the BBC's security correspondent."

Paste

"A sweeping history of spying, surveillance and subversion in the digital world. Exhaustively reported and thoroughly annotated."

Booklist

A century-spanning history of cyberespionage and the tools that have made it possible. Touching on the NSA, encryption, Chinese censorship, and the emergence of sophisticated hackers, the book will pique readers interested in the geopolitical ramifications of surveillance and the complex relationship between security and privacy in our post-9/11, post-Snowden world.

Paste

A sweeping history of spying, surveillance and subversion in the digital world. Exhaustively reported and thoroughly annotated.

Library Journal

06/01/2016
Corera (The Art of Betrayal), a security correspondent for BBC News, traces electronic espionage from World War II to the present, focusing on the UK and the United States, with Russia and China as their primary adversaries. He explores how England and America's differing policies on commercial enterprises, domestic surveillance, and transparency have influenced their tactics and capabilities through the Cold War to modern threats of terrorism. Espionage no longer focuses on code breaking but has become a matter of sifting through big data to find patterns in the traffic of code as important as the contents of its message. Sophisticated encryption became public, where it abets criminals and protects dissidents. An increasingly networked world means that cyberspies can wreak physical and financial havoc on critical infrastructure systems. Though Corera concentrates on the actions of governments, he covers not only classic espionage for military or diplomacy purposes but also corporate espionage, especially in jurisdictions with state-owned companies. A comparable analysis of recent history can be found in Adam Segal's The Hacked World Order. VERDICT Corera's illuminating summary of cyberespionage's development and potential effects on modern statecraft, war, commerce, and everyday liberties will appeal to all readers interested in those topics.—Wade M. Lee, Univ. of Toledo Lib.

Kirkus Reviews

2016-04-07
The history of cyberespionage, combining "related stories like encryption and code-breaking [and] the rise of the computer industry and its complex relationship with the secret world."In 1944, the first programmable electronic computer began operation in Britain's Bletchley Park. Built to decipher German codes, it performed brilliantly. Computers remain essential to espionage and other dubious activities, writes BBC security correspondent Corera (The Art of Betrayal: The Secret History of MI6: Life and Death in the British Secret Service, 2013, etc.) in this engrossing history of the dark side of the information revolution. By the end of the Cold War, technical advances enabled hackers and spies to steal "data at rest" inside a computer rather than struggle to intercept "data in motion" traveling from one place to another. In response, and also to detect the activity of terrorists, security organizations such as the National Security Agency sweep up immense quantities of information, including that of their own citizens, and filter it for suspicious activity. No one designed operating systems for security. In the 1980s, when experts discovered how easily hackers could penetrate computers, they began designing patches, firewalls, and other defenses. However, "it was not possible to retrofit security," so no system is immune to intrusion, theft, and damage. Some attacks, such as the Stuxnet virus, which destroyed Iran's uranium centrifuges, resemble acts of war, and there is no doubt that in future wars, "alongside tanks, missiles, and guns there would be viruses, worms, logic bombs, trapdoors and Trojan horses." This book was originally published in England, so Americans will encounter unfamiliar acronyms and an emphasis on Britain's experience, but Corera casts his net widely and makes it clear that America is the leader in the battle, as well as the most vulnerable. A convincing argument that the most secure way to communicate is via snail mail.

Product Details

BN ID: 2940169550856
Publisher: Blackstone Audio, Inc.
Publication date: 07/05/2016
Edition description: Unabridged
From the B&N Reads Blog

Customer Reviews