Syndetics cover image
Image from Syndetics

Hacks, leaks, and revelations : the art of analyzing hacked and leaked data / by Micah Lee.

By: Material type: TextTextPublisher: San Francisco, CA : No Starch Press, Inc., [2024]Description: xxviii, 512 pages : illustrations, maps ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781718503120
  • 1718503121
  • 9781718503137
  • 171850313X
Subject(s):
Contents:
Protecting sources and yourself -- Acquiring datasets -- The command line interface -- Exploring datasets in the terminal -- Docker, Aleph, and making datasets searchable -- Reading other people's email -- An introduction to Python -- Working with data in Python -- BlueLeaks, Black Lives Matter, and the CSV file format -- BlueLeaks Explorer -- Parler, the January 6 insurrection, and the JSON file format -- Epik fail, extremism research, and SQL Databases -- Pandemic profiteers and COVID-19 disinformation -- Neo-Nazis and their chat rooms.
Summary: "Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"-- Provided by publisher.
Holdings
Item type Home library Collection Shelving location Call number Materials specified Status Date due Barcode Item holds
Adult Book Adult Book Dr. James Carlson Library NonFiction New 005.83 L479 Available 33111011468572
Adult Book Adult Book Main Library NonFiction New 005.83 L479 Available 33111011349384
Total holds: 0

Enhanced descriptions from Syndetics:

Data-science investigations have brought journalism into the 21st century, and-guided by The Intercept 's infosec expert Micah Lee- this book is your blueprint for uncovering hidden secrets in hacked datasets.

Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism.

Dive into exposed datasets from a wide array of sources- the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee's own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research.

Gain practical skills in searching massive troves of data for keywords like "antifa" and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files.

You will also learn how to-

Master encrypted messaging to safely communicate with whistleblowers. Secure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop. Harvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies. Probe leaked email archives about offshore detention centers and the Heritage Foundation. Analyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network.
We live in an age where hacking and whistleblowing can unearth secrets that alter history. Hacks, Leaks, and Revelations is your toolkit for uncovering new stories and hidden truths. Crack open your laptop, plug in a hard drive, and get ready to change history.

"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"-- Provided by publisher.

Includes index.

Protecting sources and yourself -- Acquiring datasets -- The command line interface -- Exploring datasets in the terminal -- Docker, Aleph, and making datasets searchable -- Reading other people's email -- An introduction to Python -- Working with data in Python -- BlueLeaks, Black Lives Matter, and the CSV file format -- BlueLeaks Explorer -- Parler, the January 6 insurrection, and the JSON file format -- Epik fail, extremism research, and SQL Databases -- Pandemic profiteers and COVID-19 disinformation -- Neo-Nazis and their chat rooms.

Powered by Koha