CypherGhost

Home > Other > CypherGhost > Page 27
CypherGhost Page 27

by D S Kane


  April 18, 2016 – Hackers use Congressman’s iPhone to demo ability to listen into calls, monitor texts, track location | 9to5Mac

  http://9to5mac.com/2016/04/18/ss7-hack-iphone-congressman/

  April 17, 2016 – Hackers can track your every call and movement, using just your phone number

  http://www.cnet.com/news/60-minutes-demo-hackers-track-calls-and-movements-using-just-your-phone-number/

  April 17, 2016 – How strangers can hack the phone in your pocket – CBS News

  http://www.cbsnews.com/news/60-minutes-overtime-how-strangers-can-hack-the-phone-in-your-pocket/

  April 17, 2016 – This Hacker’s Account of How He Infiltrated Hacking Team Says a Lot About Digital Security

  http://gizmodo.com/this-hackers-account-of-how-he-infiltrated-hacking-team-1771504896

  April 17, 2016 – CGP Grey explains the encryption debate in the best possible way

  http://www.dailydot.com/politics/what-is-encryption-debate-cgpgrey/

  April 17, 2016 – How to deal with the rising threat of ransomware | TechCrunch

  http://techcrunch.com/2016/04/16/how-to-deal-with-the-rising-threat-of-ransomware/

  April 15, 2016 – Senate anti-encryption bill is itself a threat to national security | ZDNet

  http://www.zdnet.com/article/senate-anti-encryption-bill-a-threat-to-national-security/

  April 15, 2016 – The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard

  http://motherboard.vice.com/read/the-vigilante-who-hacked-hacking-team-explains-how-he-did-it

  April 15, 2016 – The Secret World of Tiny Phones That Go Inside Your Butt | VICE | United States

  http://www.vice.com/read/prison-phones-that-go-up-your-bum

  April 15, 2016 – U.S. Government ‘Worse Than All Major Industries’ on Cybersecurity – NBC News

  http://www.nbcnews.com/tech/tech-news/u-s-government-worse-all-major-industries-cyber-security-n556461

  April 14, 2016 – The Untold Story of the Teen Hackers Who Transformed the Early Internet

  http://paleofuture.gizmodo.com/the-untold-story-of-the-teen-hackers-who-transformed-th-1770977586

  April 13, 2016 – 0-day exploits more than double as attackers prevail in security arms race | Ars Technica

  http://arstechnica.com/security/2016/04/0-day-exploits-more-than-double-as-attackers-prevail-in-security-arms-race/

  April 13, 2016 – Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? | WIRED

  http://www.wired.com/2016/04/hacker-lexicon-white-hat-gray-hat-black-hat-hackers/

  April 12, 2016 – The Crypto Wars Are Not About Terrorism, They’re About Power – Reason.com

  http://reason.com/archives/2016/04/12/the-crypto-wars-are-not-about-terrorism

  April 12, 2016 – What You Should Know About Congress’s Latest Attempt to Criminalize Encryption

  http://lifehacker.com/what-you-should-know-about-congresss-latest-attempt-to-1770468594

  April 12, 2016 – Want to Hack Into Someone’s Email? It’ll Cost You $129 | Inc.com

  http://www.inc.com/minda-zetlin/want-to-hack-into-someones-email-itll-cost-you-129.html

  April 9, 2016 – FBI warning power companies of cyber threats to electric grid: report | TheHill

  http://thehill.com/policy/cybersecurity/275723-fbi-warning-power-companies-of-cyber-threats-to-electric-grid-report

  April 7, 2016 – Politicians who work at tech companies – Business Insider

  http://www.businessinsider.com/politicians-who-work-at-tech-companies-2016-4

  April 6, 2016 – How to Protect Your Data and Avoid Being Hacked – NBC News

  http://www.nbcnews.com/tech/tech-news/how-protect-your-data-avoid-being-hacked-n551636

  April 6, 2016 – US begins waging cyber war against Isis | News | Lifestyle | The Independent

  http://www.independent.co.uk/life-style/gadgets-and-tech/news/us-isis-begins-waging-cyber-warfare-a6970931.html

  And, from a year ago, illustrating that I’ve been following this set of topics for years:

  May 6, 2015 – The impossible task of counting up the world’s cyber armies

  http://www.zdnet.com/article/counting-up-the-worlds-cyber-armies/?tag=zd.fb.nl

  Acknowledgments

  First and foremost, this story was spawned by a series of conversations with my “Drink of the Month” friends, mostly from the Naval Postgraduate School in Monterey, CA as well as conversations with a former cypherpunk hacker. Some of the inspiration for this book came from A God’s Eye View by bestselling author and friend Barry Eisler.

  But so many other people were also crucial in preparing this manuscript for you, the reader.

  My critique partners, Ned Huston and Al Steagall, were instrumental in the final polishing of this manuscript into readable fiction. Also, fellow members of BookPod contributed critiques, including Liz Alexander, Ph.D., Bennett Smith, Michael Bland, and Sarah Talltower. My friends also helped with this task, including Will Calhoun, Barry Groves, Grant Rosen, Lee Engdahl, and most of all, my writing teacher Eric Witchey. And finally, Andrea Brown, my wife, and the CEO of the Andrea Brown Literary Agency, Inc. is the best and final voice for judging what I create.

  I want to thank my publication team, consisting of my editor, Sandra Beris; copyeditor Karl Yambert; graphic designer Jeroen Ten Berge; my formatters Kimberly Hitchens and Barb Elliott of BookNook.biz, my website designer and host Maddee James of xuni.com; my marketing expert Rebecca Berus; and Paul Marotta and Megan Jeanne of the Corporate Law Group, who incorporated The Swiftshadow Group.

  I also want to thank my literary agent, Nancy Ellis, and my film agent, Brandy Rivers, for all their hard work on my behalf.

  I am grateful for all the suggestions and advice I have received but I alone am responsible for the resulting work.

  About the Author

  D. S. KANE is the name the author has chosen to write under. He worked in the field of covert intelligence for over a decade. During that time, he traveled globally for clients including government and military agencies, the largest banks, and Fortune 100 corporations. One of the banks he investigated housed the banking assets of many of the world’s intelligence agencies and secret police forces, including the CIA and NSA. Much of his work product was pure but believable fiction, lies he told, and truths he concealed.

  Now, he’s a retired spy, still writing fiction. Through his novels, he exposes the way intelligence agencies craft fiction for sale to sway their countries and manipulate their national policy, driving countries into dangerous conflicts.

  He’s been published under his real name many times in financial trade journals on topics including global banking, computer fraud and countermeasures, financial forecasting, global electronic-funds transfer networks, and corporate finance, including one book on finance published by a major publisher. He has been a featured speaker at financial conferences and conventions. His children’s book, A Teenager’s Guide to Money, Banking and Finance, was published in 1987 by Simon & Schuster. He was once the CEO of an eBook publishing company and writes a blog (http://www.dskane.com) on topics that include new technology, politics, and the future of publishing.

  He has been guest faculty at the Whidbey Island MFA program, and also taught a course at the Muse Online Writers Conference entitled Covert Training and Covert Operations for Fiction Writers, and one on a similar topic at California libraries, funded by a federal grant. He has taught a thriller-writing course at the Pikes Peak Writers Conference and was a featured speaker at a dinner meeting of the California Writers Club. He taught finance at the Stern Graduate Business School of New York University for over ten years, and is one of the co-founders of ActFourWriters.com, a unique email-based novelists’ critique group (http://www.actfourwriters.com). His website can be found at http://www.dskane.com.

 

 

  ng books on Archive.


‹ Prev