150:
felt that "If you are looking for a clear and comprehensive guide to how communications have been intercepted, from cable-cutting in the First World War to bulk data collection exposed by Ed
Snowden, this is it ... A most readable account of how computers and the internet have transformed spying".
187:
felt that Correa "explores the evolution of computers from what used to be called signals intelligence to their transforming role in today's intelligence world. The result is an informative, balanced and revealing survey of the field in which, I suspect, most experts will find something new" and
29:
177:
as "Riveting ... Making use of excellent sources... has produced a highly relevant read that addresses the key debate in intelligence gathering - the balance between privacy and security".
161:
noted that the book "takes us through the labyrinth of cyber-espionage ... It concerns a psychosis of control, whereby the digitisation of spying infests every cranny of our lives".
194:
wrote of the book's conclusion that "The true golden age of spying and surveillance - whether carried out by states or, increasingly, by companies - is now".
303:
101:
308:
298:
270:
141:
211:
124:
about the history of digital covert operations. It examines the history of digital surveillance and
244:
96:
166:
216:
170:
120:
in the United States) is a 2015 non-fiction book by the historian and BBC journalist
28:
292:
239:
190:
183:
125:
121:
39:
157:
146:
129:
240:"Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage"
212:"Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage"
152:
22:
Cyberspies: The Secret
History of Surveillance, Hacking, and Digital Espionage
117:
Cyberspies: The Secret
History of Surveillance, Hacking, and Digital Espionage
178:
271:"Intercept: The Secret History of Computers and Spies"
111:
Intercept: The Secret
History of Computers and Spies
95:
87:
79:
69:
61:
53:
45:
35:
265:
263:
8:
21:
27:
20:
128:, and how it has transformed into modern
203:
140:The book was very positively received.
7:
14:
304:Non-fiction books about espionage
1:
325:
309:Simon & Schuster books
18:Non-fiction espionage book
26:
299:2015 non-fiction books
142:Richard Norton-Taylor
65:Pegasus Publications
23:
245:Publishers Weekly
107:
106:
102:978-1-68177-154-0
80:Publication place
316:
283:
282:
280:
278:
267:
258:
257:
255:
253:
236:
230:
229:
227:
225:
208:
167:The Sunday Times
71:Publication date
31:
24:
324:
323:
319:
318:
317:
315:
314:
313:
289:
288:
287:
286:
276:
274:
269:
268:
261:
251:
249:
238:
237:
233:
223:
221:
220:. April 7, 2016
210:
209:
205:
200:
138:
72:
19:
12:
11:
5:
322:
320:
312:
311:
306:
301:
291:
290:
285:
284:
259:
248:. May 16, 2016
231:
217:Kirkus Reviews
202:
201:
199:
196:
171:Stephen Dorril
137:
134:
114:(published as
105:
104:
99:
93:
92:
89:
85:
84:
81:
77:
76:
73:
70:
67:
66:
63:
59:
58:
55:
51:
50:
47:
43:
42:
37:
33:
32:
17:
13:
10:
9:
6:
4:
3:
2:
321:
310:
307:
305:
302:
300:
297:
296:
294:
272:
266:
264:
260:
247:
246:
241:
235:
232:
219:
218:
213:
207:
204:
197:
195:
193:
192:
191:The Economist
186:
185:
184:The Spectator
180:
176:
172:
169:
168:
162:
160:
159:
154:
149:
148:
143:
135:
133:
131:
127:
126:code-breaking
123:
122:Gordon Corera
119:
118:
113:
112:
103:
100:
98:
94:
90:
86:
83:United States
82:
78:
74:
68:
64:
60:
56:
52:
48:
44:
41:
40:Gordon Corera
38:
34:
30:
25:
16:
275:. Retrieved
250:. Retrieved
243:
234:
222:. Retrieved
215:
206:
189:
182:
174:
165:
163:
158:The Observer
156:
147:The Guardian
145:
139:
130:cyberwarfare
116:
115:
110:
109:
108:
15:
181:writing in
153:Ed Vulliamy
144:writing in
57:non-fiction
293:Categories
198:References
175:Cyberspies
173:described
179:Alan Judd
136:Reception
62:Publisher
277:July 10,
273:. Amazon
46:Language
252:July 8,
224:July 8,
49:English
36:Author
88:Pages
54:Genre
279:2020
254:2020
226:2020
97:ISBN
75:2015
164:In
155:in
91:448
295::
262:^
242:.
214:.
132:.
281:.
256:.
228:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.