The Sherlock Holmes Handbook for the Digital Age
By Alan Pearce
5/5
()
About this ebook
Sherlock Holmes is the greatest detective of all time. He is driven to right the wrongs of the world. It is only natural that he should turn his attention to the Internet.
“The Internet has become a sinister and dangerous place – a grotesque parody of all that it originally promised,” explains Holmes. “Open your eyes, Watson. We are living in a postmodern surveillance dystopia from which escape for all but the most skilled individuals is impossible.”
Luckily, Holmes has all the right answers. This is a cyber-security and digital counter-surveillance handbook like no other.
Our two heroes embark on a perilous journey to the Dark Side learning along the way to avoid the traps laid by their adversaries – the State, the Corporate Giants and the Criminals and Insane.
From self-destructing messages to anonymous browsing, we visit alternative Internets and discover how to employ the Dark Arts for the power of good.
This is a Call to Arms. The time has come to reclaim the Internet from the commercial interests, the scammers and the surveillance state. And – as Sherlock Holmes clearly demonstrates – it is really simplicity itself.
This book may only take a few hours to read but it will change your life.
In the writing of this book, Dr Watson has called upon the services of Alan Pearce, a renown cyber-security expert and author of numerous books who lectures around the world and trains journalists and others in digital counter-surveillance.
Alan Pearce
Alan Pearce is a journalist, broadcaster, former BBC correspondent, and author of several books. He has contributed to numerous publications, from Time Magazine to The Sunday Times of London. He lives in Nouvelle Aquitaine, France.
Read more from Alan Pearce
Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Deep Web for Journalists: Comms, Counter-Surveillance, Search Rating: 5 out of 5 stars5/5Playing It Safe: Crazy Stories from the World of Britain's Health and Safety Regulations Rating: 0 out of 5 stars0 ratingsGun Ownership and Shooting in France v4 Rating: 0 out of 5 stars0 ratingsComa and Near-Death Experience: The Beautiful, Disturbing, and Dangerous World of the Unconscious Rating: 0 out of 5 stars0 ratingsDunkirk Spirit Rating: 4 out of 5 stars4/5
Related to The Sherlock Holmes Handbook for the Digital Age
Related ebooks
Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Enter the Dark Net – The Internet’s Greatest Secret Rating: 4 out of 5 stars4/5Skip Tracing Basics and Beyond: A Complete, Step-By-Step Guide for Locating Hidden Assets, Second Edition Rating: 5 out of 5 stars5/5Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Rating: 0 out of 5 stars0 ratingsIntroduction to Conducting Private Investigations: Private Investigator Entry Level (02E) Rating: 5 out of 5 stars5/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsLow Tech Hacking: Street Smarts for Security Professionals Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5How to Become a Private Investigator Rating: 0 out of 5 stars0 ratingsLearn Skip Tracing Rating: 4 out of 5 stars4/5Becoming a Private Investigator Rating: 2 out of 5 stars2/5Hack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5Asterisk Hacking Rating: 0 out of 5 stars0 ratingsThe Darknet Superpack Rating: 0 out of 5 stars0 ratingsHow To Think Like A Spy: Spy Secrets and Survival Techniques That Can Save You and Your Family Rating: 4 out of 5 stars4/5How to Hack a Human: Cybersecurity for the Mind Rating: 0 out of 5 stars0 ratingsThe dark behind the web: Dark Web, Deep Web, Fake News, Social Control, AI, Computer Viruses and Hacking Rating: 0 out of 5 stars0 ratingsThe Basics of Web Hacking: Tools and Techniques to Attack the Web Rating: 3 out of 5 stars3/5Deep Web: All the mysteries and secrets behind the hidden side of the internet Rating: 0 out of 5 stars0 ratingsThe Invisible Web: Uncovering Information Sources Search Engines Can't See Rating: 3 out of 5 stars3/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsHow to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for The Sherlock Holmes Handbook for the Digital Age
1 rating1 review
- Rating: 5 out of 5 stars5/5This seems like a rather odd combination - world's greatest detective and cyber security - but it works and it works very well. Probably the only cyber security book that will ever make you laugh. Recommended!
Book preview
The Sherlock Holmes Handbook for the Digital Age - Alan Pearce
The Sherlock Holmes
Handbook for the Digital Age
*
By John H. Watson & Alan Pearce
Published at Smashwords
Copyright Alan Pearce 2016
ISBN: 9781370021567
© Alan Pearce November 2016
alanpearce.com
For
Dee and James Foster
& Kiri
Contents
Prelude
Why Write the most Instructive and Singular Handbook for the Digital Age.
Chapter One – My Life is an Open Book
Inside my iPhone I am laid bare.
Chapter Two – The Three Threats
State – Corporate – Criminal & Disturbed. Knowing your adversary.
Chapter Three – The Lock Down
Securing my Smartphone.
Chapter Four – Running Silent
We Go Unobserved.
Chapter Five – Pride is the Password
Devising the Perfect Password.
Chapter Six – We Shall Not be Taken for Fools
The Weakest Link in the Chain. I wise up.
Chapter Seven – The Drawbridge
The Easiest Way In.
Chapter Eight – Down the Rabbit Hole
I Turn Invisible.
Chapter Nine – An Inspector Calls
The Surveillance State.
Chapter Ten – Under the Radar
We Divert their Attention.
Chapter Eleven – The Dark Arts
A Walk on the Wild Side.
Chapter Twelve – Storm Coming
A Call to Arms to reclaim the Internet.
About the Authors
Dr John Watson & Alan Pearce
Useful Links
Recommended Reading
Contact
Prelude
My dear fellow,
said Sherlock Holmes as we sat on either side of the fire in his lodgings at Baker Street. The Internet should have been the most singular boon to human civilisation since Gutenberg’s moveable type printing press but what do we have instead?
Lots of amusing cat videos,
I answered.
I shall tell you,
said Holmes, ignoring my retort. Everybody posting the most intimate details of their lives, thoughts and feelings for all and sundry to pour over.
My companion sprang from his cosy chair beside the fire and took down his infernal vaping contraption from the mantelpiece. He adjusted the digital settings and was soon sending thick noxious clouds towards the ceiling. An odour vaguely reminiscent of elderflower filled the room.
Elderflower,
confirmed Holmes. A blend of my own.
He settled back and continued. "Mark my words, Watson, the streets are safer these days because so many common criminals have changed their modus operandi and now carry out their despicable crimes online in the comfort of their living rooms."
But it has also proven to be of considerable benefit to our friends the police,
I chimed in.
Or rather the Internet has become their particular hunting ground. They seek and gather data about every living soul and they make the same elementary mistakes as always.
He scoffed scornfully.
And they simply cannot keep the data safe. Take that Snowden fellow.
Holmes pointed his vaping machine in my direction. No one knows precisely what data he took, and he was just one of thousands of private contractors.
Holmes held up his hand. Now, I know that you believe that he was acting on the highest principles but can you honestly say the same for every private contractor working for the government?
I shook my head.
One can barely read a newspaper these days without some shocking revelation of a new hacking crime, exposing the innocent to the evil designs of criminals.
But surely,
I countered. "The Internet has proven a boon for you in your investigations. Just look at how you can follow people around now – a fellow’s precise movements – or how you can take over and control those CCTV security cameras that are ubiquitous these days. I would venture that the Internet has entirely changed your own modus operandi."
Not entirely, my dear Doctor. I still have this.
Holmes tapped his temple with the mouthpiece of his vaping machine. But I would venture, Watson, that the Internet is both a curse for the common man and a blessing for the world of investigation.
Then why not write it all down?
I ventured. Why not share your knowledge and know-how with the denizens of cyberspace and let them see how to protect themselves from the criminals and avoid the prying gaze of policemen and spies? They might even learn to become great detectives themselves.
Holmes laughed. Or perhaps, Watson, you might prefer to write it up yourself, as is your want.
He had risen from his chair and was standing between the parted blinds gazing down into the dull neutral-tinted London street.
‘Watson, Holmes declared, turning slowly to face me.
It is simplicity itself."
My friend came and stood above me. After all, it is little more than plain old common sense and a few good programs. I think you can handle that.
‘Well, I hesitated.
I was rather thinking that you might apply your prodigious brain to the task."
"And so I shall, Watson. But you will take copious notes and you shall make it available to the hoi polloi."
*
So it was that I obtained permission to lay down the most instructive and singular handbook for the Digital Age.
John H. Watson MD
Baker Street
London
November 2016
CHAPTER ONE
My Life is an Open Book
I had only just slipped out of my wet mackintosh and was settling myself comfortably before the fire when Holmes suddenly demanded to see my smartphone.
Try your inside, left-hand breast pocket,
suggested my friend the instant I began patting myself down. I pulled it free and handed it across.
I see you favour the iPhone. Any particular reason for that?
he asked.
I rather think them stylish,
I ventured. Aren’t they all much of a muchness?
Holmes chuckled. It is difficult for a man to have any object in daily use without leaving the impress of his individuality upon it.
I dare say,
said I, unlacing my damp shoes and placing them near to the fire.
Holmes tapped briefly on the screen and then stretched back into his chair, a look of intense scrutiny on his face. He was silent for a long time. Finally he spoke.
I see you had roast pork for luncheon on Sunday with your delightful new friend. A very handsome woman I must say.
I felt blood rush to my cheeks. Well,
I muttered. How could you possibly know that?
He continued. Tut, tut, Doctor. You have not been to the gym, not once this week. But you have been a moderately frequent visitor to the Fox and Hounds.
Holmes stroked the screen and began to smile.
Your mother’s maiden name is Brydon and she was born in London, as were you. Oh, I missed your birthday on the eighth. So sorry about that. I won’t embarrass you by mentioning your age.
Holmes held up the iPhone for my inspection. Here is a picture of your somewhat conventional Victorian semi-detached house with your rather garish red motor car parked on the drive.
He tapped the screen again and continued.
And here is a photograph of your practice in Queen Anne Street where you arrive punctually every morning bang on the stroke of nine, except last Thursday when you were nearly thirty minutes late.
I took my shoes in for repair. My lovely brogues. The heel had come off. But hang on, I didn’t take those photographs of my house nor my practice. How did you get them?
Google Earth,
Holmes explained. And you had your shoes repaired at that new place near the station. I imagine they will be ready this Wednesday.
Stop, stop,
I declared. This is positively unsettling. And how did you get into my ‘phone in the first place?
Elementary, my dear friend. I have seen you pick up and play with your device countless times, and each time when you do you tap the screen in a particular manner. From the movement of your fingers, I surmised that it was either 7-6-5-4 or, as I correctly deduced, 4-3-2-1.
And what about all the other things? Roast pork, for goodness sake. How?
"I see you are a player of Pokemon Go, said Holmes.
Do you know that it has full access to your movements and to your camera and, if you log in with your Google ID, it can access your contacts as well? And did you know that government agencies and certain criminal elements piggyback on the data in these amusements and use it to track their targets?"
Well,
I muttered. I haven’t played it for weeks.
But I did not need to access that,
said an amused Holmes. I looked in your Instagram application and saw that you had taken several photographs both prior to and immediately after your Sunday repast.
And the gym and the pub?
Ah, yes,
said my friend. You leave your Bluetooth connection on all of the time. You allow yourself to be geotagged. All I needed to do was look in your Google+ account – you were automatically logged in – and follow your movements on Google Maps in perfect detail.
The shoes?
Your Google search queries for a suitable cobbler and Google Maps again.
My mother’s maiden name? My date and place of birth?
Facebook.
These shocking revelations had left me feeling both cold and numb. I edged my chair closer to the fire.
No need to look so surprised,
laughed Holmes. After all, you have chosen to carry around with you the finest surveillance apparatus ever devised. Surely, you know that every single thing you do is open to the closest inspection?
But if I have nothing to hide, then surely I have nothing to fear.
I nodded my chin decisively.
Holmes pulled himself from the chair and stretched for his own Android ‘phone. Do you have any idea who coined that much-repeated phrase?
he asked.
Not the foggiest.
"Then I challenge you to a race. Who can find the original of that