
Hacks, Leaks, and Revelations The Art of Analyzing Hacked and Leaked Data
by Lee, MicahBuy New
Rent Book
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
In the age of hacking and whistleblowing, the internet contains massive troves of leaked information containing goldmines of newsworthy revelations in the public interest—if you know how to unravel them. For investigative journalists or amateur researchers with or without prior programming knowledge, this book gives you the technical expertise to find and interrogate complex datasets, transforming unintelligible files into groundbreaking reports.
Through hands-on assignments and examples that highlight real-world cases, information security expert and well-known investigative journalist Micah Lee guides you through the process of analyzing leaked datasets from governments, companies, and political groups. You’ll dig into hacked files from the BlueLeaks dataset of law enforcement records, analyze social media traffic from those behind the 2021 insurrection at the US Capitol, hear the exclusive story of privately leaked data from the anti-vaccine group America’s Frontline Doctors, and much more.
You'll also learn the technical skills and Python programming basics needed for data science investigations, security concepts like disk encryption, how to work with data in JSON, CSV, and SQL formats, and tricks for using the command-line interface to explore datasets packed with secrets just waiting to be discovered.
Author Biography
Table of Contents
Chapter 1: TBD
Chapter 2: Protecting Sources and Yourself
Chapter 3: Acquiring Datasets
Part 2: Tools of the Trade
Chapter 4: The Command Line Interface
Chapter 5: Exploring Datasets in the Terminal
Chapter 6: Docker, Aleph, and Making Datasets Searchable
Chapter 7: Reading Other People's Emails
Part 3: Writing Code
Chapter 8: An Introduction to Python
Chapter 9: Working with Data in Python
Part 3: Structured Data
Chapter 10: BlueLeaks, Black Lives Matter, and the CSV File Format
Chapter 11: BlueLeaks Explorer
Chapter 12: Parler, the Insurrection of January 6, and the JSON File Format
Chapter 13: Epik Fail, Extremism Research, and SQL Databases
Part 5: Case Studies
Chapter 14: Pandemic Profiteers and COVID-19 Disinformation
Chapter 15: Neo-Nazis and Their Chat Rooms
Appendixes
Appendix A: Using the Windows Subsystem for Linux
Appendix B: Scraping the Web
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.