The Fifth Domain

  • On ·
  • By ·

Defending Our Country, Our Companies,
and Ourselves in the Age of Cyber Threats

An urgent warning from two bestselling security experts–and a gripping inside look at how governments, firms, and ordinary citizens can confront and contain the tyrants, hackers, and criminals bent on turning the digital realm into a war zone.

There is much to fear in the dark corners of cyberspace: we have entered an age in which online threats carry real-world consequences. But we do not have to let autocrats and criminals run amok in the digital realm. We now know a great deal about how to make cyberspace far less dangerous–and about how to defend our security, economy, democracy, and privacy from cyber attack.

Our guides to the fifth domain — the Pentagon’s term for cyberspace — are two of America’s top cybersecurity experts, seasoned practitioners who are as familiar with the White House Situation Room as they are with Fortune 500 boardrooms. Richard A. Clarke and Robert K. Knake offer a vivid, engrossing tour of the often unfamiliar terrain of cyberspace, introducing us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can fend off cyber threats. With a focus on solutions over scaremongering, and backed by decades of high-level experience in the White House and the private sector, The Fifth Domain delivers a riveting, agenda-setting insider look at what works in the struggle to avoid cyberwar.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Extreme Privacy

  • On ·
  • By ·

Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Stealth War

  • On ·
  • By ·

How China Took Over While America’s Elite Slept

China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our national security.

The media often suggest that Russia poses the greatest threat to America’s national security, but the real danger lies farther east. While those in power have been distracted and disorderly, China has waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure–and they’re winning. It’s almost too late to undo the shocking, though nearly invisible, victories of the Chinese.

In Stealth War, retired Air Force Brigadier General Robert Spalding reveals China’s motives and secret attacks on the West. Chronicling how our leaders have failed to protect us over recent decades, he provides shocking evidence of some of China’s most brilliant ploys.

Spalding’s concern isn’t merely that America could lose its position on the world stage. More urgently, the Chinese Communist Party has a fundamental loathing of the legal protections America grants its people and seeks to create a world without those rights.

Despite all the damage done so far, Spalding shows how it’s still possible for the U.S. and the rest of the free world to combat–and win–China’s stealth war.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

The Hacker and the State

  • On ·
  • By ·

Cyber Attacks and the New Normal of Geopolitics

Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference.

Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Home Defense

  • On ·
  • By ·

The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress.

Not every disaster can be fixed. Whether it’s an epidemic or a super volcano, an asteroid strike or a world war, there are large scale disasters hovering over mankind’s future that would bring civilization to an abrupt and permanent end.

But as any good prepper knows, that doesn’t mean the end of life altogether. If you think ahead, plan ahead and prepare before disaster strikes, you can continue to live a good and healthy life completely off the grid.

This book covers:

  • The seven survivalist golden rules – and how never to break them
  • How to turn an ordinary home into a prepper’s fortress
  • How to stock your shelter to sustain you for years into the future
  • And much, MUCH more.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Re-Engineering Humanity

  • On ·
  • By ·

In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart environments. They explain how the goal of designing programmable worlds goes hand in hand with engineering predictable and programmable people.

Detailing new frameworks, provocative case studies, and mind-blowing thought experiments, Frischmann and Selinger reveal hidden connections between fitness trackers, electronic contracts, social media platforms, robotic companions, fake news, autonomous cars, and more.

This powerful analysis should be read by anyone interested in understanding exactly how technology threatens the future of our society, and what we can do now to build something better.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Citizen’s Privacy Manual

  • On ·
  • By ·

The Citizen’s Privacy Manual explains the following:

  • How to buy and establish a computer that cannot be traced to you
  • How to buy and establish a mobile phone that cannot be traced to you
  • How to covertly send and receive files
  • How to protect yourself from search warrants
  • How to avoid financial tracking in America
  • How to take your assets offshore to avoid financial tracking

This information is useful if you simply do not like the idea of the government reading your emails and listening to your telephones calls, or you want to operate away from the prying eyes of an employer, or spouse.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

The Platform Society

  • On ·
  • By ·

Public Values in a Connective World

Individuals all over the world can use Airbnb to rent an apartment in a foreign city, check Coursera to find a course on statistics, join PatientsLikeMe to exchange information about one’s disease, hail a cab using Uber, or read the news through Facebook’s Instant Articles. The promise of connective platforms is that they offer personalized services and contribute to innovation and economic growth, while bypassing cumbersome institutional or industrial overhead.

In The Platform Society,
Van Dijck, Poell and De Waal offer a comprehensive analysis of a
connective world where platforms have penetrated the heart of
societies-disrupting markets and labor relations, circumventing
institutions, transforming social and civic practices and affecting
democratic processes. This book questions what role online platforms
play in the organization of Western societies. First, how do platform
mechanisms work and to what effect are they deployed? Second, how can
platforms incorporate public values and benefit the public good?

The Platform Society highlights how this struggle plays out in four private and public sectors: news, urban transport, health, and education. Each struggle highlights local dimensions, for instance fights over regulation between individual platforms and city governments, but also addresses the level of the platform ecosystem as well as the geopolitical level where power clashes between global markets and (supra-)national governments take place.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Privacy’s Blueprint

  • On ·
  • By ·

The Battle to Control the Design of New Technologies

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves―even when the odds are deliberately stacked against them.

In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.

Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

The Perfect Weapon

  • On ·
  • By ·

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.

The Perfect Weapon
is the startling inside story of how the rise of cyberweapons
transformed geopolitics like nothing since the invention of the atomic
bomb. Cheap to acquire, easy to deny, and usable for a variety of
malicious purposes—from crippling infrastructure to sowing discord and
doubt—cyber is now the weapon of choice for democracies, dictators, and
terrorists. Two presidents—Bush and Obama—drew first blood with
Operation Olympic Games, which used malicious code to blow up Iran’s
nuclear centrifuges, and yet America proved remarkably unprepared when
its own weapons were stolen from its arsenal and, during President
Trump’s first year, turned back on the US and its allies. The government
was often paralyzed, unable to threaten the use of cyberweapons because
America was so vulnerable to crippling attacks on its own networks of
banks, utilities, and government agencies.

Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times
national security correspondent David Sanger—who broke the story of
Olympic Games in his previous book—reveals a world coming face-to-face
with the perils of technological revolution. The Perfect Weapon is
the dramatic story of how great and small powers alike slipped into a
new era of constant sabotage, misinformation, and fear, in which
everyone is a target.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

  • 1
  • 2