UFO: Every Album, Every Song

UFO: Every Album, Every Song

  • Downloads:6560
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2021-04-06 13:51:06
  • Update Date:2025-09-07
  • Status:finish
  • Author:Richard James
  • ISBN:1789520738
  • Environment:PC/Android/iPhone/iPad/Kindle

Summary

UFO, the legendary band which have been gracing the world's stages for the last 50 years, have given us more than their fair share of superb quality hard rock songs including 'Doctor, Doctor', 'Rock Bottom', 'Shoot Shoot', 'Too Hot To Handle', and 'Only You Can Rock Me'。 And that was just during the Seventies! Albums such as 'Force It', 'Obsession', 'The Wild, The Willing, And The Innocent', 'Walk On Water' and 'You Are Here' are acknowledged as classics of the melodic hard rock genre, and their live masterpiece 'Strangers In The Night' regularly features at or near the top of rock music polls。 UFO's history can be delineated by the guitarists who have passed through their ranks。 From the early 'Space Rock' stumblings, their astonishing development with the brilliant, mercurial Michael Schenker, the consolidation and first downfall during Paul Chapman's tenure, subsequent re-launches and crash-landings, a troubled reformation of the Schenker line-up, and the final mostly settled version with Vinnie Moore, this book explores each of the band's 23 studio albums, and, of course, 'Strangers'。 Every song is analysed in detail and opinions are numerous in this passionate critique of one of Britain's best loved and most influential rock institutions。

Download

Reviews

Clay

Picks up where Snowden left off: the zero-day business。 The earliest case she mentions was pre-Internet: the Russian hack on IBM typewriters in the US Embassy in Moscow that recorded every keystroke。 Current practices started with hackers posting vulnerabilities on message boards to show off, and prompt big tech to fix sloppy code。 Then a VA cybersecurity vendor got the idea of paying hackers starting at $75 for their work, then passing info to clients so they could protect themselves。 Then US d Picks up where Snowden left off: the zero-day business。 The earliest case she mentions was pre-Internet: the Russian hack on IBM typewriters in the US Embassy in Moscow that recorded every keystroke。 Current practices started with hackers posting vulnerabilities on message boards to show off, and prompt big tech to fix sloppy code。 Then a VA cybersecurity vendor got the idea of paying hackers starting at $75 for their work, then passing info to clients so they could protect themselves。 Then US defense contractors started paying much more and providing to US government agencies to use these back doors for defense or offense。 Called zero-days because when discovered, users have zero days to protect themselves or suffer the consequences。 Now many governments are into the act, and the lead between the leaders (USA, Israel, China, and Russia) and the rest is shrinking。 Price for zero-day can be $1。5m, and more with exploits built-in, i。e。 programmed to get into a target system and do something like shut off all the lights。 The most elegant one to date is Stuxnet, which used to shut down uranium enrichment in Iran for a while。 Says this was like the Manhattan Project and bomb in Hiroshima: once countries saw the potential, everyone wants to have it。 Book is a wake up call that these practices can easily get out of hand, and cause unfathomable damage: as one hacker tells the author: the world will end by accident。 On the other hand, if there was no Stuxnet, and Israelis bombed the Iranian reactor instead, it could have started a major war。 Argentina is a major zero-day center of expertise, with hackers initially motivated by getting access to high-tech services blocked or highly priced by bad government policy。 Apple tried to encrypt everything in the iPhone with no backdoor for the FBI。 The government took them to court, then dropped the case because they found a $1。3m zero-day jailbreak exploit that opened the phone for them。 Russia is testing US infrastructure grids and demonstrated its capability in shutting down Ukraine electricity, ATMs, and nearly everything else connected for a day。 A full-scale attack in the US could shut down the electric grids for months to over a year。 In the past, US hackers won global hacking awards; now its hackers from Iran, Israel, Argentina, and other such places。 Still, many US hackers are still in the game, particularly ex NSA types。 There's been a transition, like Jerry Rubin who went from revolutionary to stockbroker。 US Hackers went from "information wants to be free" to selling to the highest bidder, even if the customer was a nasty authoritarian human rights abuser。There are other tradeoffs discussed: Zero days can empower oppressed minorities like Kurds in Turkey, as well as oppressors。 It enables the whole range of governments: from the worst human rights abuzers like Sudan to the better USA and five eyes。 A Turkish Kurd working on zero days in USA draws the line when presented with a Turkish General client。 A zero day broker claims to never sell to non US clients, until a wikileaks type expose shows this isn't true: "I was shocked, and closed down my zero day trade, he claimed。" Zero days are getting more common because software is getting more complex: software once hundreds of lines is now 50 million, giving lots more room for error。 There's an ethical question of how even the "better" USA justifies keeping secret computer vulnerabilities that put citizens at risk。 One CIA official puts it that if it takes four supercomputers to exploit a vulnerability, you can leave it; it its a zero day that will be more easily spotted, tell the vendor。 The raises the further question of why vendors sell software with so many vulnerabilities。 Among the explanations is Mark Zuckerberg's famous motto: move fast and break things。 Another not discussed in the book is the need for constant updating of software helps prevent software piracy; if so, its a bad deal for customers, because common channels for zero days are the software update mechanisms。 More likely is that tech companies, like many other organizations, only take difficult actions in the aftermath of disasters, as Microsoft did in 2002 when an early Windows hack became public knowledge。The USA emerges as a highly vulnerable country because it is so wired and so at the center of things tech。 In recent years, the worst hacks have been enabled by zero days developed by NSA, stolen, and sold to the highest bidder。 One of the worst was kept by NSA for 5 years, knowing that if deployed it could affect any windows computer user。 The takeaway: NSA is the top player on offense, but dismissive of defense。 Its main defense strategy in cyberwar is to tell attackers: whatever you do to us, we will do worse back to you。Is there any hope? Some policy suggestions at the end are sensible, but hard to imagine in the USA political climate much constructive involvement from the government。 One telling point is that Nicole considers Norway a best practice policy case。 A bit like "getting to Denmark" in other governance circles: high trust societies are more likely to comply with sensible government regulation。 Nicole points out how Russian and other operations have helped to poison the trust well in the USA so that in the 2020 election the Russians were barely involved: they didn't need to be; the chaos and distrust they helped to seed 4 years before was working of its own accord。 So my guess is that her policy suggestions involving government are not likely to be adopted until the inevitable catastrophe happens。 One of her suggestions is out of date: mobilizing the best USA hackers to find vulnerabilities through competitions et al; the problem is that the best hackers are no longer US citizens, so you would be putting a 2nd rate team up against the problem。 Some of the challenges are clear in the Solar Winds hack discovered a few months ago。 Microsoft says China did it, the US government's Director of Intelligence says it's Russia。 NSA says they were surprised by it because they are forbidden by law to work within the USA to detect such things: yet Snowden showed us how they get around this。 Nicole, the book author and coauthor of the latest on Solar Winds: https://www。nytimes。com/2021/03/14/us。。。says in her book that the key to a top-notch zero-day exploit is that the target doesn't realize what's happening for weeks, months, even years in some cases。 So what's a government early warning system to do? There's talk of using private business as the early warning system, as happened by accident with Solar Winds: but the dark pathways Perlroth describes of the zero-day business make this seem risky。 Users can do their part。 90 percent of hacks are through passwords, so use 2-factor authentication, and don't use "password" as your password。 Apple products are harder to hack than others: the cost of an iPhone jailbreak zero-day is $3m or more。 But there are still nasty players willing to spend the money, and hackers willing to sell the zero-day to them。 The overall takeaway: zero-day exploits aren't going away; Governments, businesses, and individual computer users beware。 。。。more

Christopher Warshaw

Tom Clancy ain’t got nothing on the truth!!Unbelievably scary the vulnerability of today’s internet connected world we live inAfter reading this I made sure I had a lot of cash on hand for when the Cyber Wars beginNot if but when

Ben

Solid overview of infosec as it relates to natsecWell sourced and entertaining but melodramatic and the author let herself and her biases make their way into the story too much。 Needed an editor。

Marcos

Five stars because everyone should read this。 The cyber landscape isn't something I knew about at all but now I can't ignore what a looming threat it is。 The author compares it to the pandemic at the end, saying how we weren't prepared and hoping it won't take a global threat for everyone to take the issue seriously Five stars because everyone should read this。 The cyber landscape isn't something I knew about at all but now I can't ignore what a looming threat it is。 The author compares it to the pandemic at the end, saying how we weren't prepared and hoping it won't take a global threat for everyone to take the issue seriously 。。。more

Leila

Excellent。 Eye opening revelations about the cyber world, Hacking, and the Cyberweapons Arms Race, told so that even a grandmother can understand the dangers, current threats and dangers of the world we are now living in。

Toni

This book is eye opening regarding the history of cyber warfare/information security between nation states。 Highly accessible and engaging for non-trechnical readers interested in the topic but a little lacking for someone fascinated by technical details。

Dhaval Patel

Riveting story about the current state of cyber arms。 Insightful and alarming 😱

David

Absolutely fantastic! Well written,informative and timely。Recommended reading for all

Vibhor Jain

One of the tough ones to rate。The information provided is exceptional。 Shows the hard work put in by the author。 The high rating is an indicative that readers are actually in awe of the content。The downside is the presentation/layout of the content。 The book requires good editing。 At times it feels you are reading random thoughts of the writer。 Timelines feel haphazard at times。 Many points are repeated in the book。This is definitely a great foundation to the topic and adds to the awareness but One of the tough ones to rate。The information provided is exceptional。 Shows the hard work put in by the author。 The high rating is an indicative that readers are actually in awe of the content。The downside is the presentation/layout of the content。 The book requires good editing。 At times it feels you are reading random thoughts of the writer。 Timelines feel haphazard at times。 Many points are repeated in the book。This is definitely a great foundation to the topic and adds to the awareness but by no means this would be the best。 。。。more

Mike Gonzalez

23

Preetisha

A hefty book that feels satisfying to have finished! And one that makes me want to throw away my phone and move to a remote town in Montana ASAP。。 just kidding。 But I appreciated that she focused on specific conversations/people to make cybersecurity more accessible to the average human。 Pretty wild how much hacking goes on and how easy it is to not be super informed about any of it! The NSA sucks and so do our foreign adversaries! It would have been nice to see more sources for claims made thro A hefty book that feels satisfying to have finished! And one that makes me want to throw away my phone and move to a remote town in Montana ASAP。。 just kidding。 But I appreciated that she focused on specific conversations/people to make cybersecurity more accessible to the average human。 Pretty wild how much hacking goes on and how easy it is to not be super informed about any of it! The NSA sucks and so do our foreign adversaries! It would have been nice to see more sources for claims made throughout the book。 Minus one star for the author's incessant references to writing for the New York Times。。。。。 。。。more

Mike

This is an excellent book。Perlroth covers decades of history on information security, and tells detailed stories about some of the most significant publicly-known breaches。 That includes a very detailed history of the US/Israelli Stuxnet program that damaged Iranian centrifuges used for nuclear weapons development, the Chines breach of the US Office of Personnel Management's records (including security clearance applications) and much more。 The underlying technology is absolutely complicated, bu This is an excellent book。Perlroth covers decades of history on information security, and tells detailed stories about some of the most significant publicly-known breaches。 That includes a very detailed history of the US/Israelli Stuxnet program that damaged Iranian centrifuges used for nuclear weapons development, the Chines breach of the US Office of Personnel Management's records (including security clearance applications) and much more。 The underlying technology is absolutely complicated, but her book is pitched at lay readers, outside the tech sector, and is quite accessible。Just as she was finishing the book, the SolarWinds hack was discovered and reported。 That serious breach doesn't appear in the book at all -- proof of how quickly the news develops and how fast the bad news about the bad guys breaks。Her coverage is so good because she looks at the policy, espionage, economic and other incentives that underlie the infosec cold war。 This is a great primer for anyone who wants to understand why we are at risk, as well as how。The epilogue could serve as a standalone policy briefing document for Congressional staffers looking to draft legislation that would secure our infrastructure。 It's a useful read for industry infosec workers and intelligence and defense sector practitioners as well。This book is an important contribution to the public dialogue on this critical topic。 I've spent my entire career working in information technology, databases and big data, and I learned a great deal from reading it。 。。。more

Jeff Berman

When I served at the Senate, among the most chilling and riveting declassified meetings I sat in on were led by Richard Clarke, our nation’s first Cyber Czar。 The future threats he outlined then are clear and present dangers today, as brilliantly and accessibly detailed by Nicole Perlroth in This Is How They Tell Me The World Ends。 It’s hard to imagine reading a more urgent book this year。

John

Fascinating and well-written。 It tells a personal story, too, in that it delves into her journalistic work and thus has a sleuthing quality to it。 This adds to the interest。 And Perlroth seems to have a novelist's dramatic strengths that make the story as much a detective story as a handbook on the world's ills and coming ills as they relate to cyber destruction and dread。 At times some of the story and the background went too far into the weeds for me, but overall an excellent story。 Fascinating and well-written。 It tells a personal story, too, in that it delves into her journalistic work and thus has a sleuthing quality to it。 This adds to the interest。 And Perlroth seems to have a novelist's dramatic strengths that make the story as much a detective story as a handbook on the world's ills and coming ills as they relate to cyber destruction and dread。 At times some of the story and the background went too far into the weeds for me, but overall an excellent story。 。。。more

Stefan

Amazing book that will leave you both infuriated at the short sightdeness of focusing on cyber offence almost exclusively as well justifiably paranoided about the security of your digital devices。

Istók Róbert

Felt like reading a thriller, but the fact that this is based on real-life was chilling。 We live in a world where everything is connected to the internet。 This gives hackers more surface than ever before to attack us, nation-states a vast battleground to advance their interests from the comfort of their homes and makes us extremely vulnerable in case we get hacked。This book is a fascinating walkthrough of the major cyber hacks from the last 20+ years。 Stuxnet, NotPetya, Wannacry, she has it all。 Felt like reading a thriller, but the fact that this is based on real-life was chilling。 We live in a world where everything is connected to the internet。 This gives hackers more surface than ever before to attack us, nation-states a vast battleground to advance their interests from the comfort of their homes and makes us extremely vulnerable in case we get hacked。This book is a fascinating walkthrough of the major cyber hacks from the last 20+ years。 Stuxnet, NotPetya, Wannacry, she has it all。 And oh, if you read the book, you can also find out how the conspiracy theories around Bill Gates & the Covid pandemic might have gotten mainstream, amongst other gems from 2020。Want to reduce the chance of getting hacked? - Never click on suspicious links- Use a password manager to have different passwords for every app- Please turn on two-factor authentication。 This is the minimum you can do to protect your online identity。 。。。more

Ben

This is more of a history of cyberweapons than a current state of affairs, and I do wish it had gotten a bit more technical at points, but nonetheless this is a very good book outlining an underrated threat in an easily readable way。 An enjoyable and informative read, for sure。 Keep your software updated ;)

Nick

Being in this industry I was naturally interested in the topic。 Our nation's cyber defense is a topic most people dont easily grasp, but Nicole does a fantastic job of laying out the history of how we "got here" and offers suggestions on how we could proceed。 The book isn't targeted at techies, but rather laypeople, and in that Nicole succeeds in clearly addressing the serious nature of our cyber problem。 Being in this industry I was naturally interested in the topic。 Our nation's cyber defense is a topic most people dont easily grasp, but Nicole does a fantastic job of laying out the history of how we "got here" and offers suggestions on how we could proceed。 The book isn't targeted at techies, but rather laypeople, and in that Nicole succeeds in clearly addressing the serious nature of our cyber problem。 。。。more

Heather

Fascinatingly scary。 I now view data breaches, unexplained power outages, etc。 through a different lens。 Security really is an important thing, and so much of it is out of the individual's hands。 But we can make our passwords strong!Contains some bad language。 Fascinatingly scary。 I now view data breaches, unexplained power outages, etc。 through a different lens。 Security really is an important thing, and so much of it is out of the individual's hands。 But we can make our passwords strong!Contains some bad language。 。。。more

Nicholas Smeaton

An excellent look at the history of cyberwarfare up to late 2019。 Perlroth's book focuses more on the people involved than on the technical side of things which means this book is more accessable for those with limited knowledge of software development。 The book does come to terrifying conclusion but the author does an epilog in which she suggests a number of actions which would reduce the risk of an all out cyberwar hurling our society back to the middle ages。This is a must read for anyone want An excellent look at the history of cyberwarfare up to late 2019。 Perlroth's book focuses more on the people involved than on the technical side of things which means this book is more accessable for those with limited knowledge of software development。 The book does come to terrifying conclusion but the author does an epilog in which she suggests a number of actions which would reduce the risk of an all out cyberwar hurling our society back to the middle ages。This is a must read for anyone wanting to know what's going on behind the curtain of 'National Security' or for any author wanting to write a novel about Cyber warfare that is realistic。 。。。more

Caroline H

I want to go life on a mountain in Africa and never ever have to use technology again。 Don’t read this before bed because you will just be kept awake thinking about all the ways someone can hack you and every electronic device you own。

Becca

History of Cybersecurity。 Scary real-world stories of hacking, but worth being informed about our internet-dominated society。

Murray Sondergard

Definitely an eye-opener。 I was left with the impression, however, that there are not really any remedies when so many of the problems lead back to the human side, such as failing to install software patches。

CBW Librarian

Enlightening, sobering, and frightening。 This isn't going to end well。 Enlightening, sobering, and frightening。 This isn't going to end well。 。。。more

David

The author does a terrific job of detailing the recent headline grabbing cyber harms and incursions and the message is grim: everyone's doing it and we're all vulnerable。 The playing field is leveling and the consequences of a real attack with bad intentions could be perilous。 Update your software as quickly as possible, don't use out-of-date software, keep your passwords long, don't open attachments or click on links from questionable email senders, use 2 factor authentication whenever possible The author does a terrific job of detailing the recent headline grabbing cyber harms and incursions and the message is grim: everyone's doing it and we're all vulnerable。 The playing field is leveling and the consequences of a real attack with bad intentions could be perilous。 Update your software as quickly as possible, don't use out-of-date software, keep your passwords long, don't open attachments or click on links from questionable email senders, use 2 factor authentication whenever possible and hope you get lucky。Target audience is novices, tech insiders may find the material too basic or missing key details。 If the subject matter interests you I'd recommend the book highly。Some nit picks:*I spotted at least a dozen typos/errors/repetitions/misuse of a word or phrase and it started to become a distraction。 The proofreading/editing was subpar。*I enjoyed the author's writing style except when she occasionally adopted a Mark Bowden-ish voice。 I'm a Mark Bowden fan but it was a jarring contrast to the writer's natural style。*A kindle & GR complaint: when I get to the end of every kindle book a menu pops up asking me to rate the book and then GR marks the book as "Read。" It's so annoying。 。。。more

Anna

Excellent investigative reporting。 To say this is the stuff of nightmares is a vast understatement。

Rachael Juliette

Really well researched, comprehensive, and fast paced。

John Ens

Wow。

Tomasz Onyszko

For folks in security area - this is light read, do not expect a deep dive content and stories, however it is a perfect book to recommend to people who are not deep in security to help them understand how this part of the world operates and what those "hacks" means。 Very well written, light and fast to read。 This book provides a story on how the market for 0-day (or more broadly security exploits) developed, how it turned into a nation state actors arm race and the major events in this area。 It For folks in security area - this is light read, do not expect a deep dive content and stories, however it is a perfect book to recommend to people who are not deep in security to help them understand how this part of the world operates and what those "hacks" means。 Very well written, light and fast to read。 This book provides a story on how the market for 0-day (or more broadly security exploits) developed, how it turned into a nation state actors arm race and the major events in this area。 It is an helicopter view from journalist who follows this area for long time - light to read, not technical, good for general audience。 It adds some insight to stories you may already be familiar with (Snowden, Shadow Brokers) from journalist perspective。 For me it was also nice trip on the memory lane, reading about events I was witnessing (in not very conscious way) as a young professional on Bugtraqu and similar forums。 Makes more sense now :) Good to read is you are not in the security and want to get a 1000ft view on what it is about。 As an additional read to this book I recommend to to pick "The Dragons and the Snakes" - https://www。goodreads。com/book/show/4。。。 - it adds to the picture how these capabilities were developed in response to the changes in military doctrine of United States (it is about military and war but both tells similar story) 。。。more

Neil Doherty

This book was a wake up call。 I did not realize how vulnerable the internet, electronic banking, the grid, hospital records, my cell phone & all my passwords are。 Time to go to multifactor authorization and get cash, water, and survival supplies for when Russian, Chinese, Iranian, or other hostile nation states or cyber criminals attack, which is happening so often that I had become numb to it。 Now I recognize WE have a problem。 & I do not think USA has the will or insight to construct a cyber d This book was a wake up call。 I did not realize how vulnerable the internet, electronic banking, the grid, hospital records, my cell phone & all my passwords are。 Time to go to multifactor authorization and get cash, water, and survival supplies for when Russian, Chinese, Iranian, or other hostile nation states or cyber criminals attack, which is happening so often that I had become numb to it。 Now I recognize WE have a problem。 & I do not think USA has the will or insight to construct a cyber defense as good as the Scandinavian states or Japan, but I hope we start。I also think I need to learn more about disinformation, especially from Russia, on Facebook and Twitter。 No mention in book about electronic games but I suppose they have all been hacked and are loaded with zero days, since rush to market and commercial success far outweigh internet & gamer security。 。。。more