Knowledge (XXG)

Cyberspies

Source 📝

150:
felt that "If you are looking for a clear and comprehensive guide to how communications have been intercepted, from cable-cutting in the First World War to bulk data collection exposed by Ed Snowden, this is it ... A most readable account of how computers and the internet have transformed spying".
187:
felt that Correa "explores the evolution of computers from what used to be called signals intelligence to their transforming role in today's intelligence world. The result is an informative, balanced and revealing survey of the field in which, I suspect, most experts will find something new" and
29: 177:
as "Riveting ... Making use of excellent sources... has produced a highly relevant read that addresses the key debate in intelligence gathering - the balance between privacy and security".
161:
noted that the book "takes us through the labyrinth of cyber-espionage ... It concerns a psychosis of control, whereby the digitisation of spying infests every cranny of our lives".
194:
wrote of the book's conclusion that "The true golden age of spying and surveillance - whether carried out by states or, increasingly, by companies - is now".
303: 101: 308: 298: 270: 141: 211: 124:
about the history of digital covert operations. It examines the history of digital surveillance and
244: 96: 166: 216: 170: 120:
in the United States) is a 2015 non-fiction book by the historian and BBC journalist
28: 292: 239: 190: 183: 125: 121: 39: 157: 146: 129: 240:"Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage" 212:"Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage" 152: 22:
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
117:
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
178: 271:"Intercept: The Secret History of Computers and Spies" 111:
Intercept: The Secret History of Computers and Spies
95: 87: 79: 69: 61: 53: 45: 35: 265: 263: 8: 21: 27: 20: 128:, and how it has transformed into modern 203: 140:The book was very positively received. 7: 14: 304:Non-fiction books about espionage 1: 325: 309:Simon & Schuster books 18:Non-fiction espionage book 26: 299:2015 non-fiction books 142:Richard Norton-Taylor 65:Pegasus Publications 23: 245:Publishers Weekly 107: 106: 102:978-1-68177-154-0 80:Publication place 316: 283: 282: 280: 278: 267: 258: 257: 255: 253: 236: 230: 229: 227: 225: 208: 167:The Sunday Times 71:Publication date 31: 24: 324: 323: 319: 318: 317: 315: 314: 313: 289: 288: 287: 286: 276: 274: 269: 268: 261: 251: 249: 238: 237: 233: 223: 221: 220:. April 7, 2016 210: 209: 205: 200: 138: 72: 19: 12: 11: 5: 322: 320: 312: 311: 306: 301: 291: 290: 285: 284: 259: 248:. May 16, 2016 231: 217:Kirkus Reviews 202: 201: 199: 196: 171:Stephen Dorril 137: 134: 114:(published as 105: 104: 99: 93: 92: 89: 85: 84: 81: 77: 76: 73: 70: 67: 66: 63: 59: 58: 55: 51: 50: 47: 43: 42: 37: 33: 32: 17: 13: 10: 9: 6: 4: 3: 2: 321: 310: 307: 305: 302: 300: 297: 296: 294: 272: 266: 264: 260: 247: 246: 241: 235: 232: 219: 218: 213: 207: 204: 197: 195: 193: 192: 191:The Economist 186: 185: 184:The Spectator 180: 176: 172: 169: 168: 162: 160: 159: 154: 149: 148: 143: 135: 133: 131: 127: 126:code-breaking 123: 122:Gordon Corera 119: 118: 113: 112: 103: 100: 98: 94: 90: 86: 83:United States 82: 78: 74: 68: 64: 60: 56: 52: 48: 44: 41: 40:Gordon Corera 38: 34: 30: 25: 16: 275:. Retrieved 250:. Retrieved 243: 234: 222:. Retrieved 215: 206: 189: 182: 174: 165: 163: 158:The Observer 156: 147:The Guardian 145: 139: 130:cyberwarfare 116: 115: 110: 109: 108: 15: 181:writing in 153:Ed Vulliamy 144:writing in 57:non-fiction 293:Categories 198:References 175:Cyberspies 173:described 179:Alan Judd 136:Reception 62:Publisher 277:July 10, 273:. Amazon 46:Language 252:July 8, 224:July 8, 49:English 36:Author 88:Pages 54:Genre 279:2020 254:2020 226:2020 97:ISBN 75:2015 164:In 155:in 91:448 295:: 262:^ 242:. 214:. 132:. 281:. 256:. 228:.

Index


Gordon Corera
ISBN
978-1-68177-154-0
Gordon Corera
code-breaking
cyberwarfare
Richard Norton-Taylor
The Guardian
Ed Vulliamy
The Observer
The Sunday Times
Stephen Dorril
Alan Judd
The Spectator
The Economist
"Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage"
Kirkus Reviews
"Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage"
Publishers Weekly


"Intercept: The Secret History of Computers and Spies"
Categories
2015 non-fiction books
Non-fiction books about espionage
Simon & Schuster books

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.