Book
At Large: The Strange Case of the World's Biggest Internet Invasion
📖 Overview
At Large chronicles the true story of a cybercriminal who penetrated major computer networks across the United States in the early 1990s. The investigation to catch this hacker involved multiple law enforcement agencies, security experts, and journalists racing to prevent further breaches of government and corporate systems.
The book follows both the perpetrator's digital trail of attacks and the parallel efforts of those trying to track him down. Mann reconstructs the technical details and investigative process while maintaining narrative momentum through the complex world of early internet security.
The investigation unfolds against the backdrop of a rapidly evolving internet landscape, when cybersecurity protocols were still developing and few understood the full implications of network vulnerabilities. The stakes continue to escalate as more critical systems come under threat.
This account serves as an early warning about the challenges of cybersecurity and raises questions about privacy, technology, and security that remain relevant today. The book captures a pivotal moment when society began to grapple with the dark potential of interconnected computer systems.
👀 Reviews
Readers found this 1997 cybercrime book outdated but appreciated its accessible explanation of early internet security issues. Many noted it reads like a thriller while explaining technical concepts clearly for non-experts.
Likes:
- Clear explanations of complex security concepts
- Fast-paced narrative structure
- Research quality and journalistic detail
- Portrayal of early hacker culture
Dislikes:
- Technology references feel dated
- Story drags in middle sections
- Some technical details oversimplified
- Abrupt ending
As one Amazon reviewer noted: "The technical details are dated but the human elements of cybersecurity remain relevant."
Ratings:
Goodreads: 3.7/5 (219 ratings)
Amazon: 4.1/5 (31 ratings)
Several readers mentioned this book helps explain the foundation of current cybersecurity challenges, though its specific technical content is no longer applicable. Multiple reviews describe it as "a time capsule of early internet crime."
📚 Similar books
The Cuckoo's Egg by Clifford Stoll
A system administrator tracks down hackers who broke into Lawrence Berkeley Laboratory's computers, leading to the discovery of a larger espionage operation.
Ghost in the Wires by Kevin D. Mitnick The memoir recounts Mitnick's years as a fugitive hacker who penetrated corporate systems while evading FBI pursuit.
The Masters of Deception by Michelle Slatalla, Joshua Quittner This account chronicles the rivalry between two hacker groups in the 1980s and their battles for control of telephone networks.
Underground by Suelette Dreyfus The book documents the exploits of computer hackers in the international underground scene of the 1980s and early 1990s.
The Art of Deception by Kevin D. Mitnick The text details real-world cases of social engineering attacks and security breaches through human manipulation rather than technical means.
Ghost in the Wires by Kevin D. Mitnick The memoir recounts Mitnick's years as a fugitive hacker who penetrated corporate systems while evading FBI pursuit.
The Masters of Deception by Michelle Slatalla, Joshua Quittner This account chronicles the rivalry between two hacker groups in the 1980s and their battles for control of telephone networks.
Underground by Suelette Dreyfus The book documents the exploits of computer hackers in the international underground scene of the 1980s and early 1990s.
The Art of Deception by Kevin D. Mitnick The text details real-world cases of social engineering attacks and security breaches through human manipulation rather than technical means.
🤔 Interesting facts
🔍 The main subject of the book, a teenage hacker known as "Phantom Dialer," managed to breach systems at major institutions including Los Alamos National Laboratory without any formal computer training.
💻 Author Charles C. Mann conducted extensive research for this book while simultaneously writing "Noah's Choice," making him one of the first journalists to deeply explore the emerging world of cybercrime in the 1990s.
🌐 The events in the book took place during a pivotal time when the Internet was transitioning from a primarily academic and military network to a public infrastructure, exposing numerous security vulnerabilities.
👥 The investigation described in the book involved an unprecedented collaboration between civilian computer experts and law enforcement, helping establish protocols for future cybercrime investigations.
🕒 The techniques used by the hacker to breach systems, while considered sophisticated in the 1990s, are now taught as basic security concepts in many computer science courses, highlighting how rapidly technology has evolved.