Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Good Read: The Snowden Files

Uday Mittal June 26, 2015 Leave a Comment

Good Read: The Snowden Files

When I first heard about the PRISM mass surveillance program, conducted by the United States National Security Agency (NSA), I thought it was an hoax. Primarily, because up until then that kind of stuff belonged to Hollywood movies only, at least for the uninformed me. But as the news snowballed and caught the attention of the media, worldwide, the reality of mass surveillance programs and their implications started to dawn on me. I felt cautious and curious.

Around an year back I came across a book called, The Snowden Files authored by Luke Harding and published by Vintage Books. It presented a detailed account of why and how Edward Snowden blew the whistle on one of the most covert operations. It spoke in length about the PRISM program, it’s constituents and how the United States of America and it’s allies are leveraging it to establish their dominance in the global political regime. It also gave an insight into similar programs being conducted by other nations like China, Russia, Germany etc.

Given the nature of the task undertaken by Edward Snowden, one would wonder what instigated or motivated him to do it in the first place. He did it for the greater good, of course, but at what cost? His life became a living hell. The book delves deep into his background and motivations for blowing the whistle. While his intentions and his act are debatable but nonetheless they did got people thinking. At least now we know that the Big Brother from George Orwell’s 1984 is watching us though not as actively yet.

This book is a must read if you’re interested in mass surveillance and how it impacts an average citizen. You’ll get an insight into the type of technology intelligence agencies have access to, the depth of research conducted by them and, most importantly, why you must watch your actions while using various communication mediums facilitated by today’s technologies. You might think you’re of no interest to them but give them one reason and they’ll dig up your entire history.

Read the reviews and ratings at Goodreads.com.

Purchase the book (print or digital format) from Amazon.in (India) or Amazon.com (International).

Related Posts

  • What you need to know about XKeyScore: NSA’s Mass Surveillance ToolWhat you need to know about XKeyScore: NSA’s Mass Surveillance Tool
  • Hacking the Internet of Things: How Easy Is It?Hacking the Internet of Things: How Easy Is It?
mm
Uday Mittal

Uday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity awareness, offensive security research etc. and has authored various articles on topics related to cyber security and software development for a leading magazine on open source software.

Filed Under: Good Reads, Non-Fiction Tagged With: Edward Snowden, Luke Harding, Mass Surveillance, The Snowden Files

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress