Buy new:
-45% $16.43
FREE delivery Saturday, May 18 on orders shipped by Amazon over $35
Ships from: Amazon
Sold by: Far Beyond Rubies
$16.43 with 45 percent savings
List Price: $30.00

The List Price is the suggested retail price of a new product as provided by a manufacturer, supplier, or seller. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. List prices may not necessarily reflect the product's prevailing market price.
Learn more
Get Fast, Free Shipping with Amazon Prime FREE Returns
FREE delivery Saturday, May 18 on orders shipped by Amazon over $35. Order within 10 hrs 58 mins
In Stock
$$16.43 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$16.43
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Ships from
Amazon
Returns
30-day easy returns
30-day easy returns
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Returns
30-day easy returns
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$10.53
Ships same or next business day with delivery confirmation. Good condition. May or may not contain highlighting. Expedited shipping available. Ships same or next business day with delivery confirmation. Good condition. May or may not contain highlighting. Expedited shipping available. See less
FREE delivery May 18 - 20. Details
Or fastest delivery Thursday, May 16. Order within 22 hrs 58 mins. Details
Only 3 left in stock - order soon.
$$16.43 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$16.43
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Ships from and sold by IndianaBookCompany.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Something went wrong. Please try your request again later.

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Hardcover – May 23, 2023

4.5 4.5 out of 5 stars 280 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$16.43","priceAmount":16.43,"currencySymbol":"$","integerValue":"16","decimalSeparator":".","fractionalValue":"43","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"B1bUst5A1Nz%2BXoge0rJoLKuqNqNW6MAJD%2FkLWRjnkm%2BibCbAqnJ0v8gsZtnF%2F73841XSlNap%2FUf048muJeZlBPFuS6QLGRaR96M2UWZv%2FHDIVDuiFqObmtd4W%2BI150tPWdJhnqjUTKy%2Bmx7sXZSPNUWOeuGRUIDxGWMUovO0xnurcO0ktaEo8jRVeHAZusgr","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$10.53","priceAmount":10.53,"currencySymbol":"$","integerValue":"10","decimalSeparator":".","fractionalValue":"53","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"B1bUst5A1Nz%2BXoge0rJoLKuqNqNW6MAJ5g%2BcVJJk0594KsGL%2Bz6nniI%2FCVqAdBvhdipkHKAx2fd%2B2dAUlCD5za%2Fsp7aMkjTRqaDUKV5iEwkd%2BjXrqZi3G7lZHRNbNMn9bc%2FwkSH2kJDQZOU7uDdYAtPm%2BFWEHmow4GOjogSa0Nq78RCKTN6ANXU36qTmM7rN","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

“Unsettling, absolutely riveting, and―for better or worse―necessary reading.” ―Brian Christian, author of Algorithms to Live By and The Alignment Problem

An entertaining account of the philosophy and technology of hacking―and why we all need to understand it.

It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.

In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of
Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.

Includes black-and-white images

Read more Read less

Amazon First Reads | Editors' picks at exclusive prices

Frequently bought together

$16.43
Get it as soon as Saturday, May 18
In Stock
Sold by Far Beyond Rubies and ships from Amazon Fulfillment.
+
$16.27
Get it as soon as Saturday, May 18
In Stock
Ships from and sold by Amazon.com.
+
$15.05
Get it as soon as Saturday, May 18
In Stock
Ships from and sold by Amazon.com.
Total price:
To see our price, add these items to your cart.
Details
Added to Cart
These items are shipped from and sold by different sellers.
Choose items to buy together.

From the Publisher

Praise for Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro

Fancy Bear Goes Phishing Scott J. Shapiro Brian Christian quote

Fancy Bear Goes Phishing Scott J. Shapiro Garrett Graff quote

Fancy Bear Goes Phishing Scott J. Shapiro Publishers Weekly review

Editorial Reviews

Review

"Shapiro is funny and unflaggingly fascinated by his subject, luring even the nonspecialist into technical descriptions of coding by teasing out connections between computer programming and, say, the paradox of Achilles and the tortoise . . . A single paragraph moves nimbly from Putin to Descartes to The Matrix . . . Readers [. . .] will find that their expectations have been entertainingly subverted." ―Jennifer Szalai, The New York Times

"Scott Shapiro is a pretty rare bird―an eminent legal scholar who is also a geek . . . [He] manages to carve a readable path through the conceptual undergrowth . . . [
Fancy Bear Goes Phishing is] an impressive achievement . . . [An] absorbing tour of cyberspace’s netherworld." ―John Naughton, The Observer

"[Shapiro] masterfully blends consideration of two sorts of code, software and legal . . . His narrative zips between technical explanations, legal reasoning and the ideas of thinkers including René Descartes and Alan Turing . . . [Shapiro] succeeds in making [hacking] intelligible to non-specialist readers."
The Economist

“Scott Shapiro’s lively history . . . [uses] vivid case studies to dramatise a technically complex subject . . . His chronological big five hacks are springboards for the stories of pioneers such as . . . John von Neumann . . . or a deft exploration of how virus writers exploit cognitive biases . . . His impish humour and freewheeling erudition suit a world saturated in pop culture . . . All [hackers] have something in common . . . they see it as a game. Shapiro’s achievement is to tell you how it is played.”
―Dorian Lynskey, The Guardian

"Gripping . . . Fancy Bear Goes Phishing offers level-headed suggestions to reduce cybercrime, decrease cyber-espionage and mitigate the risks of cyberwar, arguing that we need to move beyond an obsession with technical fixes and focus instead on the outdated and vulnerable upcode that shapes the shoddy downcode we live with now." ―Richard Lea, The Wall Street Journal

"This scintillating book [. . . ] manages to hack the reader . . . [
Fancy Bear Goes Phishing] is a profound work on the idea of technology . . . If you think that books involving discussions of law must be boring, then Shapiro is a good antidote since he is a very humanist and humane writer . . . Erudite, witty, and arch." ―Stuart Kelly, The Scotsman

“Like Virgil guiding Dante through the bowels of a medieval Renaissance Hell, Scott J. Shapiro steers readers of
Fancy Bear Goes Phishing through . . . the feral realm of cyberhacking . . . [Readers] will walk away with enhanced insight into our disquieting digital environment . . . a wise book.” ―Howard Schneider, The Progressive

"Ingenious coding, buggy software, and gullibility take the spotlight in this colorful retrospective of hacking . . . Shapiro’s snappy prose manages the extraordinary feat of describing hackers’ intricate coding tactics and the flaws they exploit in a way that is accessible and captivating even to readers who don’t know Python from JavaScript. The result is a fascinating look at the anarchic side of cyberspace." Publishers Weekly

“This is an engrossing read . . . An authoritative, disturbing examination of hacking, cybercrime and techno-espionage.”
Kirkus Reviews

"The question of trust is increasingly central to computing, and in turn to our world at large.
Fancy Bear Goes Phishing offers a whirlwind history of cybersecurity and its many open problems that makes for unsettling, absolutely riveting, and―for better or worse―necessary reading." ―Brian Christian, author of Algorithms to Live By and The Alignment Problem

"
Fancy Bear Goes Phishing is an essential book about high-tech crime: lively, sometimes funny, readable, and accessible. Shapiro highlights the human side of hacking and computer crime, and the deep relevance of software to our lives." Bruce Schneier, author of A Hacker's Mind: How the Powerful Bend Society's Rules and How to Bend them Back

"Scott Shapiro's
Fancy Bear Goes Phishing fills a critical hole in cybersecurity history, providing an engaging read that explains just why the internet is as vulnerable as it is. Accessible for regular readers, yet still fun for experts, this delightful book expertly traces the challenge of securing our digital lives and how the optimism of the internet's early pioneers has resulted in an online world today threatened by spies, criminals, and over-eager teen hackers." ―Garrett Graff, co-author of The Dawn of the Code War

About the Author

Scott J. Shapiro is a professor of law and philosophy at Yale Law School and the director of the Yale Center for Law and Philosophy and its CyberSecurity Lab. He is also the author of Legality and the coauthor, with Oona Hathaway, of The Internationalists: How a Radical Plan to Outlaw War Remade the World.

Product details

  • Publisher ‏ : ‎ Farrar, Straus and Giroux (May 23, 2023)
  • Language ‏ : ‎ English
  • Hardcover ‏ : ‎ 432 pages
  • ISBN-10 ‏ : ‎ 0374601178
  • ISBN-13 ‏ : ‎ 978-0374601171
  • Item Weight ‏ : ‎ 1.4 pounds
  • Dimensions ‏ : ‎ 6.35 x 1.35 x 9.4 inches
  • Customer Reviews:
    4.5 4.5 out of 5 stars 280 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Scott J. Shapiro
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

4.5 out of 5 stars
4.5 out of 5
280 global ratings
One of the most readable/authoritative internet histories EVER
5 Stars
One of the most readable/authoritative internet histories EVER
I read a lot of books about the internet and I really have never come across one that explains the *actual tech* so well and so elegantly while still being readable and narrative. Basically this really walks you through the backside of the internet -- not the tell-all stories about Big Tech firms or wunderkinds -- but like the actual *nerds* that built it. It's just funny and so well done and I learned things and I thought I knew this stuff already. 5 STARS would book again.
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

Reviewed in the United States on July 8, 2023
Shot in the dark here, but I'm betting that you didn't have "Will read a book about cybersecurity in 2023 and will be ABSOLUTELY, UTTERLY TRANSFIXED!" on your bingo card. (If you did, that's okay, too!) Whatever the case, though, _Fancy Bear Goes Phishing_ is that book, and you'll swear afterwards (and during) that you never imagined that a book about cybersecurity and hacking could be so engrossing, so compulsively readable, and so informative.

_Fancy Bear_ reads as part true crime and part gentle explainer. Along the way, you may discover that things you thought were true are not, that some of your fears were unjustified, and that some aspects of cybersecurity that many, even most, Americans tend to overlook (including, importantly, policymakers) are serious matters to which we need to devote more attention. These go beyond attending to your personal online safety (and if you're not doing that now, you'll probably feel an urgent need to do so after reading this book) to building pressure for legislators, law enforcement, and corporations to make cybersecurity a priority.

The book drives toward Shapiro's discussion in the conclusion and the epilog of how to, and how not to, address the cybersecurity challenges we face. Titled "The Death of Solutionism," Shapiro argues that relying exclusively or primarily on technology to remedy the conditions that allow cybercrime and cyberwar to flourish is doomed to fail due to two principles that are intrinsic to computing itself (what Shapiro calls "the two principles of metacode"): the duality of code and data (that is the capacity for one to function as the other) and the physicality of computation (that is, computing is a physical process subject to the constraints of the physical world). Throughout the book he fleshes out various ways in which these two principles operate, and he brings them to bear (pun half-intended) in discussing the nature of the challenges now facing us.

Does this mean we're doomed? Not by any means. Here Shapiro's attention to the people behind the cyberoffenses he has documented pays off in offering ways forward: in case after case, he demonstrates that the perpetrators of malicious hacks respond to the perverse and not-so-perverse incentives that attend their own situations, from the family stresses, ostracism, and neurodevelopmental challenges faced by adolescent boys to the economic plight of highly-trained technologists in post-Cold-War Eastern Europe. By turning our attention to these conditions, we can stave off many of the future technological threats that might otherwise be realized.

In short, then, Shapiro has given us in Fancy Bear Goes Phishing an urgent, illuminating, entertaining, and above all humane work whose relevance to our lives today cannot be emphasized enough.
8 people found this helpful
Report
Reviewed in the United States on March 15, 2024
Well-told explanation of the history of cybersecurity that should be read widely.
Reviewed in the United States on March 24, 2024
Some chapters were dragging
I liked the technological stuff explained as simple as possible for a common man to understand
The book gives an understanding of upcode
How cyberwar can change the future
One person found this helpful
Report
Reviewed in the United States on June 4, 2023
I don't want to read books about cyber-crime, I confess; though I do want to understand what it is and what the risks really are, as far as anyone can tell. But this is a true crime adventure -- witty and wild -- and somehow, along the way, while reading about heists and hackers, I learned to parse the headlines and my uncooperative desktop as well. The oddball humans featured here are the true mystery -- and described in riveting detail. Super relatable, super great read.
3 people found this helpful
Report
Reviewed in the United States on June 27, 2023
I’ve been really excited to read this book ever since I heard about it and I was not disappointed. It’s incredibly well written and interesting to read. You can tell that the author put in a large amount of effort to educate himself on the topic, which you can see through his thorough and detailed explanation of events. As someone who has to do cyber security training for a political organization every few months, this book helped actualize a lot of the threats that we’re warned about.
2 people found this helpful
Report
Reviewed in the United States on September 4, 2023
If you are a bit into this topic, you do not learn a lot, although the author’s legal and IT background provide interesting perspective on how to look at the dark side of IT.
2 people found this helpful
Report
Reviewed in the United States on July 6, 2023
"Fancy Bear Goes Phishing" by Scott J. Shapiro is an extraordinary exploration of the digital world we inhabit. It is a book that is as unsettling as it is riveting, making it a must-read for anyone seeking to understand the intricacies of our information society.

Shapiro, drawing from his popular Yale University class on hacking, masterfully exposes the secrets of the digital age. His lucidity and wit make complex concepts accessible, and his storytelling brings to life the human-interest side of cybercrime. The tales of hackers, from the graduate student who accidentally crashed the internet in the 1980s to the Russian intelligence officers who sought to influence a US election, are as fascinating as they are enlightening.

This book is not just about the technology of hacking, but also about the philosophy behind it. Shapiro argues that cybercrime is less about defective programming and more about the faulty wiring of our psyches and society. This unique perspective makes "Fancy Bear Goes Phishing" a standout in the field of cybersecurity literature.

Shapiro also addresses the vital questions of our time: Why is the internet so vulnerable? What can we do in response? His answers are fresh and thought-provoking, offering valuable insights into the future of hacking, espionage, and warfare in the digital age.

"Fancy Bear Goes Phishing" is a lively and original account that combines the philosophical adventure of "Gödel, Escher, Bach" with dramatic true-crime narrative. It is an essential guide on how to navigate and protect oneself in an era of rampant cybercrime. This book is not just a fascinating read, but a necessary one for our times.

In conclusion, "Fancy Bear Goes Phishing" is a brilliant exploration of the digital world, a book that is as informative as it is entertaining. It is a must-read for anyone who wishes to understand the complexities of our information society and the challenges we face in the digital age.
2 people found this helpful
Report

Top reviews from other countries

Thomas
5.0 out of 5 stars Great book
Reviewed in Germany on May 5, 2024
Great book, not deeply technical but still enjoyable about events in the past that I never knew about.
Amazon Customer
4.0 out of 5 stars solid but scattered
Reviewed in Australia on May 29, 2023
The heart of the book is five stories about hacking, from the first worm written as a one man experiment in 1998 to the Russian state's hacking teams in the US election in 2016. These stories are well told and fascinating, but there is also a strange mix of other influences that make up about a third of the material. The author talks about the flaws in "downcode" (what is normally called code) and "upcode" (the rules, conventions, and expectations that people follow) in an attempt to provide a larger picture of computer security. This works, but the invented words do not contribute much to the picture.

The author tries to steer a middle course between, to use his words, the extremes of dull technical detail about computer security and purple prose about how hacking will destroy the world. There is actually a third type of story, hacking as history where the ins and outs of famous hacks are described in detail, such as Sandworm by Andy Greenberg or Worm by Mark Bowden. Those books are meant as entertainment for an audience with a technical background, where a lot of the words, ideas, and methods are known to the reader. This book explains basic ideas and methods so its audience can understand the hack, then gives the hack, then talks about how the hack was allowed by poor code and poor real world procedures so it's hard to see exactly what audience the book is written for.

I loved the stories and the other bits of hacking and computer history, but not the speechifying about how we can and must improve computer security.
mikes
4.0 out of 5 stars Very informative via case studies
Reviewed in the United Kingdom on July 7, 2023
Some knowledge eg of "stacks" is helpful, but by and large there is excellent coverage of techniques that have been unleashed on the public over the last 2-3 decades. A good read.
One person found this helpful
Report
Richard M Marshall
2.0 out of 5 stars In desperate need of a good editor: AVOID
Reviewed in the United Kingdom on September 11, 2023
Oh dear, this book has so many problems it's difficult to know where to start. First of all the author invents his own, unnecessary terminology. "Downcode" which is just "code" and "upcode" which is behaviour. A simple global edit to that effect would have improved readability dramatically. Secondly it is SOOOO repetitive that it is a struggle to read. Many times he writes paragraphs in this form: fact/opinion. blah blah blah. fact/opinion repeated. A good editor could have take 100-150 pages out and made it a good book.

Next comes his terrible attempts at explaining technical terms and problems. Not only are most of these utterly broken, they are unnecessary. It reads like he is trying to explain them to himself, and failing. It breaks what little flow the book.

And finally, despite the claims of examing why hacking happens, there is much too much history (most of which could be found out with a quite search if the reader is interested), endless miles of vaguely philosophical waffle, padded out by attempts to show off the authors erudition by quoting ancient philoshopers, and not enough factual information about the perpitrators.

Why 2* and not 1*? Because there are occasional snippets of useful information if you can find them.
One person found this helpful
Report