Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Dedication Contents Introduction Part One: Espionage
1. Exploiting Home-Field Advantage 2. Defeating Encryption 3. Building a Backdoor 4. Strategic Espionage 5. Counterintelligence
Part Two: Attack
6. Strategic Sabotage 7. Targeted Disruption 8. Coercion 9. Testing and Demonstration
Part Three: Destabilization
10. Election Interference 11. Exposure 12. Theft, Ransom, and Manipulation 13. Widespread Disruption
Conclusion Notes Acknowledgments Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion