Search:

The Mueller report : report on the investigation into Russian interference in the 2016 presidential election [large print] / by Mueller, Robert S.,III,1944-author.(CARDINAL)785640; United States.Department of Justice.Special Counsel's Office,issuing body.(CARDINAL)792783;
This is the full text of special counsel Robert Mueller's investigation into Russian interference in the 2016 presidential election.
Subjects: Large print books.; Trump, Donald, 1946-; Presidents; Presidents; Presidents; Presidents; Elections; Elections; Elections; Political campaigns; Internet in political campaigns; Internet in political campaigns; Social media; Social media; Hacking; Hacking; Progaganda, Russian; Espionage; Obstruction of justice; International relations.; Social media.;
Available copies: 3 / Total copies: 3
unAPI

Foreign agent [large print] : a thriller / by Thor, Brad,author.(CARDINAL)341852;
"Terrorism in Europe has spun out of control. The United States has decided on a dramatic response and the CIA needs a very special kind of operative. Scot Harvath has exactly the skills the CIA is looking for. A former U.S. Navy SEAL with extensive experience in espionage, and now working for a private intelligence company, he will provide the CIA and the President with absolute deniability. Deep within the Russian Caucasus, Moscow also has its own special kind of operative. As a child, Sacha Baseyev endured an unimaginable horror. Today, he lives and breathes for only one reason -- to kill. And he will kill as many Americans as it takes to accomplish his mission." -- Back cover.In a safe house near the Syrian border, a clandestine American operations team readies to launch a dramatic mission months in the making. Their target: the director of social media for ISIS, Abu Muslim al-Naser. Multiple analysts, as well as a senior congresswoman, are in country to monitor the raid, but before the team can launch, the safe house is attacked. What unfolds in the bloody aftermath is a political and public relations nightmare. As horrific videos of the Americans are published on the Internet, the blame-storming back in Washington goes into full swing, focusing on how the intel for the raid was developed and how it might have leaked. As the search for answers mounts, half spy, half covert counterterrorism operative Scot Harvath quickly finds himself at the center of the storm. Working for a private intelligence agency contracted by both the CIA and the DoD, it was Harvath who pinpointed al-Naser. But how could ISIS have known the Americans were coming, much less where they would be staging? There has to be more to it; something everyone - especially the politicians - is missing.
Subjects: Large print books.; Fiction.; Harvath, Scot (Fictitious character); United States. Central Intelligence Agency; Terrorism; Terrorism; Intelligence officers;
Available copies: 26 / Total copies: 29
unAPI

The director : a novel / by Ignatius, David,1950-(CARDINAL)348749;
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a mole hunt unlike anything in spy fiction - one that takes the reader into the hacker underground of Europe and America and ends up in a landscape of paranoia and betrayal. Like the new world of cyber-espionage from which it's drawn, The Director is a maze of deception and double dealing, about a world where everything is written in zeros and ones, and nothing can be trusted. The CIA has belatedly discovered that this is not your father's Cold War, and Weber must play catch-up, against the clock and an unknown enemy, in a game he does not yet understand. -- Jacket flap.
Subjects: Spy fiction.; United States. Central Intelligence Agency; Computer crimes; Computer networks; Cyberterrorism; Hackers; Suspense fiction.;
Available copies: 37 / Total copies: 38
unAPI

Kompromat : how Russia undermined American democracy / by Pegues, Jeff,1970-author.(CARDINAL)341734;
Includes bibliographical references and index.This is warfare -- Mining for clues at the DNC -- Meanwhile, back at the White House ... -- The dossier -- They are hacking the hell out of us -- Dead drops, invisible ink, propaganda, and deep cover -- Modern-day spies -- Conversation with a ghost -- Vladimir Putin: who is this guy? -- The playbook -- Putin's grudge against Clinton -- The separation between federal and state government -- From civil rights to Russian intelligence -- Living the dream: Birmingham -- Moscow on the Hudson -- They're talking -- The cyber ref: a conversation with Michael Hayden -- Election Day -- What has just happened? -- A sidenote about Comey -- There can't be two presidents -- Obama responds -- 9/11, Antifa, and Hamilton 68: a conversation with Laura Rosenberger -- Race-based propaganda: undermining democracy by tapping our Achilles' heel -- The documents -- Putin's end game in the United States -- Clues for reporters: that nagging feeling -- Voting booth dinosaurs -- A hole in the dike -- Cyber tools -- Should we trust them? -- Things have gone horribly awry -- The new playing field -- Our playbook -- Why didn't they see it? -- A patriotic Russian hacker."A CBS correspondent presents an in-depth examination of Russian interference in the 2016 presidential campaign and measures to protect US voting systems against future cyber attacks"--"A timely and essential book from the CBS correspondent who has led their coverage of Russia election interference and the FBI counterintelligence investigation into whether the Trump Campaign coordinated with the Russians. In this compelling account of how the Russians hacked the 2016 US election, CBS News Justice and Homeland Security correspondent Jeff Pegues reveals how far the Kremlin poked into voter databases and why it happened. He also investigates the steps taken to shore up election systems in states across the country ahead of the 2018 midterm elections and, indeed, the 2020 presidential election. Based on exclusive interviews with officials from the FBI, and the Department of Homeland Security, and with cybersecurity experts, Kompromat takes readers behind the scenes and into the minds of investigators following the case. Pegues delves into the shadowy world of Russian spies, unraveling the complicated web of contacts between Russian operatives and Trump representatives during and after the campaign. In one chapter, he focuses on Valery Gerasimov, widely believed to be the mastermind behind a Russian cyber strategy designed to influence and disrupt democracies. Evidence is presented showing that the Russians infiltrated not only Democratic Party computer networks in the US, but networks in Ukraine and Europe as well. Consulting with representatives of top cyber security firms, the author discusses what states are doing to protect voting systems in the next midterm elections and beyond. Fascinating and chilling at the same time, Kompromat opens a window into the murky world of espionage, digital warfare, and a newly aggressive Russia brazenly inserting itself into US politics"
Subjects: Elections; Electronic voting; Hacking; Internet in political campaigns; Presidents; Propaganda, Russian;
Available copies: 4 / Total copies: 4
unAPI

The surveillance state [videorecording] : big data, freedom, and you / by Rosenzweig, Paul,1959-teacher.; Rosenzweig, Paul,teacher.(CARDINAL)511906; Teaching Company.(CARDINAL)349444;
Accompanying guidebook with the same title Includes bibliographical references (pages 173-178).[Lectures delivered by] Professor Paul Rosenzweig, The George Washington University Law School.Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Investigate the techniques by which foreign governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses. Dive into privacy issues and security issues using the Fifth Amendment perspective. Trace the history of the news media from the Pentagon Papers to Wikileaks. Explore legal issues surrounding metadata gathering in the years after 9/11, and whether it violates the 4th Amendment protection.DVD.
Subjects: Filmed lectures.; Video recordings for the hearing impaired.; Aerial surveillance.; Data protection.; Electronic surveillance.; National security; Privacy, Right of;
Available copies: 1 / Total copies: 1
unAPI

If it's smart, it's vulnerable / by Hypponen, Mikko,author.; Moss, Jeff(Computer security expert),writer of foreword.;
Foreword / Jeff Moss -- Preface -- Saab 9000 Turbo -- The good and bad of the internet: Prehistoric internet ; The first websites ; Linux is the world's most important system ; iPhone vs. supercomputer ; Online communities ; Money is data ; Codes all around us ; Geopolitics ; Security Tetris ; Who are we fighting? ; The Rolex -- Malware : then, now, and in the near future: The history of malware ; Smartphones and malware ; Law enforcement and malware ; Ransomware Trojans -- The human element: The two problems ; The heist ; CEO fraud ; Protecting company networks ; Bug bounties ; Wi-fi terms of use ; Mikko's tips ; Mikko's tips for the startup entrepreneur ; Boat for sale -- What if the network goes down?: Electrical networks ; Security factories ; Hypponen's law ; Dumb devices ; Regulation ; Care software updates -- Online privacy: Life without Google ; Murder charges never expire ; Is Google listening to you? ; Gorillas ; Startup business logic ; Biometrics ; Antisocial media ; Online influencing and elections ; Privacy is dead ; Before and after Gmail ; Encryption techniques ; Data is the new uranium ; CASE Vastaamo -- Cryptocurrencies: The value of money ; Blockchains ; The environmental impacts of Bitcoin ; Playing the market ; Ethereum, Monero, and Zcash ; NFT ; Bitcoin and crime ; Border guards vs. Bitcoin -- Technology, espionage, and warfare online: Cyberweapons ; Technology and warfare ; Under a false flag ; Concealability of cyberweapons ; The fog of cyberwar ; Case Prykarpattyaoblenergo ; Case Pyeongchang ; Governments as malware authors ; Russia and China ; Case Stuxnet ; Damage coverage ; Explosion at the White House ; My boycott of RSA, Inc. -- The future: Artificial intelligence ; Wolverines ; AI will take our jobs ; Smart malware ; Metaverse ; The technology of warfare ; "You are under arrest for a future murder" ; Those who can adapt will prosper ; Tesla ; Trends in technology.
Subjects: Internet of things; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

The surveillance state [sound recording] : big data, freedom, and you / by Rosenzweig, Paul,1959-author,speaker.; Teaching Company.(CARDINAL)349444;
Accompanying guidebook with the same title Includes bibliographical references (pages 173-178).Disc 1. Security, liberty, or neither? ; The Charlie Hebdo tragedy -- Disc 2. East Germany's Stasi state ; Surveillance in America -- Disc 3. Failing to connect the dots on 9/11 ; The U.S. spy network in action -- Disc 4. Big data's shadow ; Some problems with privacy -- Disc 5. Under observation: the Panopticon effect ; Drones, drones everywhere -- Disc 6. Biometrics: eyes, fingers, everything ; Hacking, espionage, and surveillance -- Disc 7. Local police on the cyber beat ; Geolocation: tracking you and your data -- Disc 8. Internet surveillance ; Metadata: legal or not -- Disc 9. Technology outruns the law ; Your personal data is the product -- Disc 10. The internet of things ; Anonymity: going off the grid -- Disc 11. Code breaking versus code making ; Europe's right to be forgotten -- Disc 12. National security and the First Amendment ; The privacy debate needs you.Lecturer, Professor Paul Rosenzweig, The George Washington University Law School.A course of 24 lectures by Professor Paul Rosenzweig.Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Investigate the techniques by which foreign governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses. Dive into privacy issues and security issues using the Fifth Amendment perspective. Trace the history of the news media from the Pentagon Papers to Wikileaks. Explore legal issues surrounding metadata gathering in the years after 9/11, and whether it violates the 4th Amendment protection.
Subjects: Audiobooks.; Electronic surveillance.; Data protection.; Aerial surveillance.; National security; Privacy, Right of;
Available copies: 1 / Total copies: 1
unAPI

Putin : his downfall and Russia's coming crash / by Lourie, Richard,1940-author.(CARDINAL)344570;
Includes bibliographical references (pages 245-249) and index.PART ONE: The Present as Prologue -- 1. Arms and the Man -- PART TWO: Background Check -- 2. The Education of V.V. Putin -- 3. Dresden -- PART THREE: Ascent -- 4. Russia's Fall, Putin's Rise -- 5. The Russia Putin Inherited and Its Spiritual Ills -- PART FOUR: Core Issues -- 6. Oil : A Wasting Asset -- 7. The Heart of the Matter : Ukraine -- PART FIVE: North- and Eastward -- 8. Russia's Mecca : The Artctic -- 9. Manifesting Destiny : Asia -- PART SIX: The Twilight of Paranoia -- 10. How Vladimir Putin Learned to Stop Worrying and Love the Internet -- PART SEVEN: The End and After -- 11. Russia Without Putin, Putin Without Russia."For reasons that are made clear in this book, Putin's Russia will collapse just as Imperial Russia did in 1917 and as Soviet Russia did in 1991. The only questions are when, how violently, and with how much peril for the world. The U.S. election complicates everything, including: Putin's next land grab; Exploitations of the Arctic; Cyber-espionage; Putin and China... and many more crucial topics. An essential read for everybody bewildered and dismayed by the new world order"--Provided by publisher.
Subjects: Biographies.; Putin, Vladimir Vladimirovich, 1952-; Putin, Vladimir Vladimirovich, 1952-; Putin, Vladimir Vladimirovich, 1952-; Presidents; Political culture; Political corruption;
Available copies: 19 / Total copies: 19
unAPI

Lost son : an American family trapped inside the FBI's secret wars / by Forrest, Brett,author.(CARDINAL)671457;
"When Billy Reilly vanished, his parents embarked on a desperate search for answers. Was their son's disappearance connected to his mysterious work for the FBI, or was it a personal quest gone wrong? Only when Wall Street Journal reporter Brett Forrest embarks on his own investigation does a picture emerge: of the FBI's exploitation of US citizens through a secretive intelligence program, a young man's lust for adventure within the world's conflicts, and the costs of a rising clash between Moscow and Washington. September 11th roused Billy Reilly's curiosity for religions, war, and the world and its people beyond his small town near Detroit. Online, Billy taught himself Arabic and Russian. His passions led him into jihadi Internet forums, attracting the interest of the FBI. An amateur drawn into professional intelligence, Billy became a Confidential Human Source, one of thousands of civilians who assist FBI agents with investigative work, often at great hazard and with little recourse. When Russia stirred rebellion in Ukraine, Billy set out to make his mark. In Russia, Billy's communications dropped. His parents, frantic, asked the FBI for help but struggled to find answers. Grasping for clues, the Reilly family turned to Brett Forrest. Commencing a quest of his own, Forrest applied years' worth of research, along with decades of extensive experience in Russia, illuminating the inner workings of the national-security machine that enmeshed Billy and his family, picking up the lost son's trail. A masterwork of reporting, composed like a thriller, blending political maneuvering and international espionage, Lost Son illustrates one man's coming of age amid new global dangers"--
Subjects: Biographies.; Reilly, Billy, 1986-2015.; United States. Federal Bureau of Investigation.; Espionage, American.; Espionage, American; Espionage, American; Intelligence service; Russian Invasion of Ukraine, 2022;
Available copies: 4 / Total copies: 6
unAPI

Snafu : the definitive guide to history's greatest screwups / by Helms, Ed,author.(CARDINAL)342976;
Includes bibliographical references.Part I. The Fifties -- Atomic energy lab : an enriching radioactivity for the Oppenheimers of tomorrow -- The Chosin few : more than they could chew -- Jimmy Carter's nuclear nuts -- MKUltra : one man's mission to trip America's balls off for freedom -- Mars bluff bomb -- A119 : shoot the moon--literally! -- Part II. The Sixties -- Project iceworm : even without iceman missiles, we're in the danger zone -- Acoustic kitty : can you hear meow? -- Operation Popeye : make mud, not war -- Catching fire on the Cuyahoga -- Top five...failed plots to assassinate El Comandante -- Part III. The Seventies -- Silencio : three meteors, two lightning strikes, and a rocket from the neighbor next door -- Project Azorian : a sub above -- Pigeon pals : our new eye in the sky -- Operation Snow White : a fair game of espionage -- Skylab : the little space station that couldn't -- Swinging spies : the Koechers -- Part IV: The Eighties -- Operation monopoly : do nyet pass go -- Ozone : a spray tan for the whole planet -- The cola cold war -- Top five...bodacious viruses that bugged us in the Eighties -- Noriega's nifty package -- Dark Dante : banned from the Internet -- Part V. The Nineties -- Snow way! The CIA's accidental drug shipment -- Biosphere 2 : too good to be true -- Keyboard cowboys : partners in cybercrime -- Beanie breakdown : the toy that tainted the Nineties -- Mars orbiter : the probe to nowhere -- Part VI: Aughts & onward -- Emergency landing : the little hard drive that couldn't -- The millennium challenge : or, how to rig a game...to lose it -- Agent BTZ : the early bird gets the worm -- The Hawai'ian missile alert : a drill, not a drill, not not a drill -- The Suez Canal : largest enema ever given -- Top five...near extinctions in the new millennium.History contains a plethora of insane screwups--otherwise known as SNAFUs. Coined during World War I, SNAFU is an acronym that stands for Situation Normal: All F*cked Up. In other words, "things are pretty screwed up, but aren't they always?" Spanning from the 1950's to the 2000's, Ed Helms steps in as unofficial history teacher for a deep dive into each decade's craziest SNAFUs. From planting nukes on the moon to training felines as CIA spies to weaponizing the weather, this book will unpack the incredibly ironic decision-making and hilariously terrifying aftermath of America's biggest mishaps. Filled with sharp humor and lively illustrations, SNAFU is a wild ride through time that not only entertains but offers fresh insights that just might prevent history from repeating itself again and again.
Subjects: Common fallacies;
Available copies: 10 / Total copies: 19
unAPI