Dinle ya da oku

Sesli kitapların büyülü dünyasına adım at.

  • İlk 2 ay ₺124,99/ay
  • Binlerce sesli kitap ve e-kitap.
  • Dilediğin kadar dinle ya da oku.
  • Çevrimdışı modu.
  • İstediğin zaman iptal et.
Abonelik başlat
TR - Details page - Device banner - 894x1036

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

1 Puan

5

Süre
10sa 43dk
Dil
İngilizce
Format
Kategori

True Crime

The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the US Department of Justice

A former US Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful online retailers, anybody, anywhere―including rogue regimes, terrorists, and countries forbidden from doing business with the United States―had access to these goods for any purpose whatsoever.

But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99’s products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan―a US commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li’s capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.

An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

© 2016 Blackstone Publishing (Sesli Kitap): 9781504647694

Yayın tarihi

Sesli Kitap: 18 Ocak 2016

Etiketler

Bunları da beğenebilirsin...

  1. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  2. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  3. The Shadow War: Inside Russia's and China's Secret Operations to Defeat America Jim Sciutto
  4. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  5. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  6. Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
  7. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  8. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  9. Bad Blood: Secrets and Lies in a Silicon Valley Startup John Carreyrou
  10. Nine Lives: My Time as the West’s Top Spy inside al-Qaeda Aimen Dean
  11. Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin’s Spies Gordon Corera
  12. The End of the World is Just the Beginning: Mapping the Collapse of Globalization Peter Zeihan
  13. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  14. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  15. Hunting LeRoux: The Inside Story of the DEA Takedown of a Criminal Genius and His Empire Elaine Shannon
  16. Mossad: The Greatest Missions of the Israeli Secret Service Michael Bar-Zohar
  17. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  18. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  19. Monolith to Microservices: Evolutionary Patterns to Transform Your Monolith Sam Newman
  20. Hackable: How to Do Application Security Right Ted Harrington
  21. Empire of Pain: The Secret History of the Sackler Dynasty Patrick Radden Keefe
  22. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  23. The Deep State: A History of Secret Agendas and Shadow Governments Ian Fitzgerald
  24. Software Engineering at Google: Lessons Learned from Programming Over Time Tom Manshreck
  25. Spies in the Family: An American Spymaster, His Russian Crown Jewel, and the Friendship That Helped End the Cold War Eva Dillon
  26. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
  27. Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
  28. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
  29. Cybersecutity First Principles Rick Howard
  30. The Human Instinct: How We Evolved to Have Reason, Consciousness, and Free Will Kenneth R. Miller
  31. The Rape of Nanking: The Forgotten Holocaust of World War II Iris Chang
  32. Working Backwards: Insights, Stories, and Secrets from Inside Amazon Bill Carr
  33. How I Rob Banks: And Other Such Places FC
  34. The Deep Learning Revolution Terrence J. Sejnowski
  35. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  36. The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman Richard P. Feynman
  37. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  38. The Meaning of It All: Thoughts of a Citizen-Scientist Richard P. Feynman
  39. The Oswalds: An Untold Account of Marina and Lee Paul R. Gregory
  40. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  41. The AI Delusion Gary Smith
  42. The New Rules of War: Victory in the Age of Durable Disorder Sean McFate
  43. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  44. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  45. Hacking: How to Hack Alex Wagner
  46. Breaking and Entering-The Extraordinary Story of a Hacker Called "Alien": The Extraordinary Story of a Hacker Called "Alien" Jeremy N. Smith

Storytel dünyasını keşfet:

  • Kids mode

  • Çevrimdışı modu

  • İstediğin zaman iptal et

  • Her yerde erişim

Sınırsız

Sınırsızca dinlemek ve okumak isteyenler için.

₺249.99 /ay
  • 1 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat

Sınırsız Yıllık

Sınırsızca dinlemek ve okumak isteyenler için.

₺1499.99 /yıl
6 ay öde, 12 ay dinle
  • 1 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat

Aile (2 hesap)

Hikayeleri sevdikleri ile paylaşmak isteyenler için.

₺379.99 /ay
  • 2 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat

Aile (3 hesap)

Hikayeleri sevdikleri ile paylaşmak isteyenler için.

₺474.99 /ay
  • 3 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat