
Fancy Bear Goes Phishing
The Dark History of the Information Age, in Five Extraordinary Hacks
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
3 months free
Buy for $24.74
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Jonathan Todd Ross
-
By:
-
Scott J. Shapiro
Long-listed, Amazon.com Best Books of the Year, 2023
"Unsettling, absolutely riveting, and—for better or worse—necessary reading."—Brian Christian, author of Algorithms to Live By and The Alignment Problem
An entertaining account of the philosophy and technology of hacking—and why we all need to understand it.
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.
In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.
A Macmillan Audio production from Farrar, Straus and Giroux.
©2023 Scott J. Shapiro (P)2023 Macmillan AudioListeners also enjoyed...




















Critic reviews
"Ingenious coding, buggy software, and gullibility take the spotlight in this colorful retrospective of hacking . . . Shapiro’s snappy prose manages the extraordinary feat of describing hackers’ intricate coding tactics and the flaws they exploit in a way that is accessible and captivating even to readers who don’t know Python from JavaScript. The result is a fascinating look at the anarchic side of cyberspace."—Publishers Weekly
“This is an engrossing read . . . An authoritative, disturbing examination of hacking, cybercrime and techno-espionage.”—Kirkus Reviews
"The question of trust is increasingly central to computing, and in turn to our world at large. Fancy Bear Goes Phishing offers a whirlwind history of cybersecurity and its many open problems that makes for unsettling, absolutely riveting, and—for better or worse—necessary reading."—Brian Christian, author of Algorithms to Live By and The Alignment Problem
People who viewed this also viewed...


















Good pacing, but a little all over
Something went wrong. Please try again in a few minutes.
A Decent Read / Listen
Something went wrong. Please try again in a few minutes.
Familiar stories with new twists
Something went wrong. Please try again in a few minutes.
Great combination of history and current events
Something went wrong. Please try again in a few minutes.
Exceptional exploration of modern day hams and their perpetrators
Something went wrong. Please try again in a few minutes.
interesting
Something went wrong. Please try again in a few minutes.
Long
Something went wrong. Please try again in a few minutes.
He also states at one point "Cybersecurity failures are never just technical failures. They are always the result of systemic failures through the up-code stack." I've worked in cybersecurity for several years, and this is hilariously inaccurate. This circumstance is clearly sometimes the case, but it's absolutely not the only reason. The statement also just invites abdication of responsibility by shifting it up the chain. In reality, responsibility can be on any or all heads in the chain (security analyst, team lead, product manager, all the way to CISO, CEO, and board of directors). We can be given all the best resources and people in the world, and we will still sometimes make mistakes that are entirely own fault. Security technicians, engineers, and developers are not exempt.
There's a section toward the end of chapter 6 where the author clearly favors a particular person who had previously plead guilty to several federal crimes over several years, always expressing remorse but ending up committing the same types of crimes again, ultimately staying he believes the felon has "aged out" of cyber crime. I'm fine with having this opinion, but as with many other topics the author discussed, it's never directly expressed as opinion. The line between opinion and fact should never be this abundantly blurred.
Near the end of chapter 8, the author refers to someone as "another Trump minion" instead of any other term, such as "campaign associate" or anything else besides minion.
In chapter 9, the author goes out of his way to make a tangent about anime references one hacker uses. He explains the main characters, except in those series, these are not the main characters. (For Yuno in MIrai Nikki, there's an argument, but it's mostly Yuki. In Shimoneta, Ana is nowhere near a main character.) Given this, I am quite uncertain about the factuality of other tangents in the book, especially those littered with personal opinion. Why would you go out of your way to explore a topic you fail to have basic facts on?
Decent history, but quite flawed
Something went wrong. Please try again in a few minutes.
Not a very complete sotry
Something went wrong. Please try again in a few minutes.
However, the author attempts to educate the audience in a variety of ways that are self-aggrandizing of his expertise in an area where he clearly is not. I understand the need to break down complexities for an audience but wow this was painful at times. This includes a seemingly simple description of Middle Eastern geopolitical conflicts as something he has the authority to speak on as well as make matter of fact statements on how entire countries will react to situations.
I found the opening background of his education and how he came back to this topic over the top, but there are so many worse examples throughout the book. Do yourself a favor and learn about malware from someone in the field that wants to tell you about their field. Not someone that passes opinion along as smoothly as fact.
Self-aggrandizing author
Something went wrong. Please try again in a few minutes.