Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out and provides explicit details of every step he takes to make someone completely disappear, including legal documents and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described. For many, this is the only privacy manual needed to secure a new digital life.
The Shadow War: Inside Russia’s and China’s Secret Operations to Defeat America
In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto provides us with a revealing and at times disturbing guide to this new international conflict. This Shadow War is already the greatest threat to America’s national security, even though most Americans know little or nothing about it. With on-the-ground reporting from Ukraine to the South China Sea, from a sub under the Arctic to unprecedented access to America’s Space Command, Sciutto draws on his deep knowledge, high-level contacts, and personal experience as a journalist and diplomat to paint the most comprehensive and vivid picture of a nation targeted by a new and disturbing brand of warfare.
Thankfully, America is adapting and fighting back. In The Shadow War, Sciutto introduces readers to the dizzying array of soldiers, sailors, submariners and their commanders, space engineers, computer scientists, civilians, and senior intelligence officials who are on the front lines of this new kind of forever war. Intensive and disturbing, this invaluable and important work opens our eyes and makes clear that the war of the future is already here.
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the South China Sea in 2034—and the path from there to a nightmarish global conflagration. So begins a disturbingly plausible work of speculative fiction, co-authored by an award-winning novelist and decorated Marine veteran and the former commander of NATO, a legendary admiral who has spent much of his career strategically outmaneuvering America’s most tenacious adversaries.
Written with a powerful blend of geopolitical sophistication and human empathy, 2034 takes us inside the minds of a global cast of characters–Americans, Chinese, Iranians, Russians, Indians–as a series of arrogant miscalculations on all sides leads the world into an intensifying international storm. In the end, China and the United States will have paid a staggering cost, one that forever alters the global balance of power.
Everything in 2034 is an imaginative extrapolation from present-day facts on the ground combined with the authors’ years working at the highest and most classified levels of national security. Sometimes it takes a brilliant work of fiction to illuminate the most dire of warnings: 2034 is all too close at hand, and this cautionary tale presents the reader a dark yet possible future that we must do all we can to avoid.
In T-Minus AI: Humanity’s Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that’s easy to comprehend. A recognized national expert and the U.S. Air Force’s first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.
Kanaan also illuminates the global implications of AI by highlighting the cultural and national vulnerabilities already exposed and the pressing issues now squarely on the table. AI has already become China’s all-purpose tool to impose authoritarian influence around the world. Russia, playing catch up, is weaponizing AI through its military systems and now infamous, aggressive efforts to disrupt democracy by whatever disinformation means possible.
America and like-minded nations are awakening to these new realities, and the paths they’re electing to follow echo loudly, in most cases, the political foundations and moral imperatives upon which they were formed.
The Long Game: China’s Grand Strategy to Displace American Order
For more than a century, no US adversary or coalition of adversaries has ever reached sixty percent of US GDP. China is the sole exception, and it is fast emerging into a global superpower that could rival, if not eclipse, the United
States. What does China want, does it have a grand strategy to achieve it, and what should the United States do about it?
In The Long Game, Rush Doshi draws from a rich base of Chinese primary sources, including decades worth of party documents, leaked materials, memoirs by party leaders, and a careful analysis of China’s conduct to provide a history of China’s grand strategy since the end of the Cold War. Taking readers behind the Party’s closed doors, he uncovers Beijing’s long, methodical game to displace America from its hegemonic position in both the East Asia regional and global orders through three sequential “strategies of displacement.”
A New Era of Cyberwar and the Hunt for
the Kremlin’s Most Dangerous Hackers
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses—from drug manufacturers to software developers to shipping companies. At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.
The Promise and the Peril of the Digital Age
Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.
In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world’s largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech’s relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying “Microsoft memoir,” the book pulls back the curtain remarkably wide onto some of the company’s most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.
Why and How You Should Take Back Control of Your Data
Every minute of every day, our data is harvested and exploited… It is time to pull the plug on the surveillance economy.
Governments and hundreds of corporations are spying on you, and everyone you know. They’re not just selling your data. They’re selling the power to influence you and decide for you. Even when you’ve explicitly asked them not to.
Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us–from our data. Privacy is as collective as it is personal, and it’s time to take back control.
Privacy Is Power tells you how to do exactly that. It calls for the end of the data economy and proposes concrete measures to bring that end about, offering practical solutions, both for policymakers and ordinary citizens.
Who Has Your Data and Why You Should Care
Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our data is being used—sometimes against us—by the private sector, the government, and even our employers and schools. It explains the trends in data science, technology, and the law that impact our everyday privacy.
It’s high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us.
This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?
Reclaim Your Digital, Financial, and Lifestyle Freedom
Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from digital privacy and asset protection to international nomadism and privacy during the COVID lockdowns. Equally important, it presents hundreds of real examples, arguments, and historical contexts for why privacy is the most important thing one can preserve.