At Large: The Strange Case of the World's Biggest Internet Invasion


Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.
At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military ...

See more details below
Paperback (Reprint)
$20.15 price
(Save 8%)$21.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (38) from $1.99   
  • New (11) from $11.97   
  • Used (27) from $1.99   
At Large: The Strange Case of the World's Biggest Internet Invasion

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$15.99 price


Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.
At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

Read More Show Less

Editorial Reviews

From the Publisher
Jon Katz The New York Times Book Review Freedman and Mann understand technology, computers, and security issues. Their message in At Large is clear and convincing.

Time Digital A thriller...spine-chilling...reads like a John Grisham novel.

The San Diego Union-Tribune A fascinating story....Read it and you'll never look at the Internet or your computer quite the same.

Publishers Weekly - Publisher's Weekly
An obsessive, meticulous pattern of virtual break-ins is plaguing the computers of MIT, NASA and other allegedly secure systems. As it becomes clear that one user is systematically gaining access to the machines, the FBI, as in other similar cases, is inspired to catch the criminal and then to use him or her as an example for future hackers (or "crackers," in derogatory techie lingo). Mann (coauthor, Noah's Choice) and Freedman (editor of Inc. Technology magazine) follow the case as it unfolds, demonstrating that no computer is entirely secure. As the break-ins described here prove ultimately as harmless in intent as they are dangerous in potential, the most intriguing mystery involves the personality of the brain-damaged perpetrator who sends the FBI and computer experts into such a frenzy. The prose here is articulate, the research impressive, and while the narrative never explodes with the excitement of Jonathan Littman's computer crime tales, it should keep even dedicated Web surfers away from their screens and focused on paper pages for a few absorbing hours. First serial to the New Yorker. (July)
Library Journal
Freedman, editor of Inc. Technology magazine, and Mann (Noah's Choice, LJ 2/15/95) have collaborated to produce a rather aimless account of a widespread series of related and mostly unpublicized computer-hacking incidents perpetrated by a cracker (computer hacker) known as "Phantomd." Basing their book on numerous personal interviews with network system administrators and "hundreds of megabytes of computer logs" (yawn), the authors presumably wish to convey some sort of "ominous warning about the Internet's fatal flaws." While network administrators worried about system security issues may find these accounts fascinating, average online mavens will find them dull and plodding. The epilog succumbs to preachiness on the topic of computer and network security. More riveting accounts of computer crime can be found in two books from Jonathan Littman, The Fugitive Game (LJ 1/96) and The Watchman (LJ 2/15/97).Joe Accardi, Northeastern Illinois Univ. Lib., Chicago
Kirkus Reviews
A real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving, edge-of-your-seat story.

Freedman (Brainmakers, 1994) and Mann (coauthor, Noah's Choice, 1995) tell the tale of a reclusive teenage hacker, alternatively dubbed Phantomd and Infomaster, who hopscotches around the Internet, breaking into systems and generally wreaking havoc online; his "absurd, dangerous, monomaniacal course" of trespassing on computer networks causes even his hacker cronies to fear him. With incisive descriptions and prose that's never overburdened by jargon, the authors chronicle the progression of Phantomd's online intrusions from university computers to Intel to top-secret government databases, and the federal investigation that finally nabs him. Unfortunately, the story loses steam at the end, when the FBI inexplicably decides not to have him prosecuted. Still, the book works because of the authors' skill at portraying their characters and building suspense and momentum from online events that are difficult to visualize. The best character, by far, is Phantomd himself, a disabled and massively antisocial youth who is capable of spending days at a time at his computer. As the hacker gets deeper and deeper into trouble, his brother tries futilely to save him, and the book takes on the dimensions of an information-age tragedy. Phantomd's last line, in particular, is heartbreaking, a testament to how the writers deftly recruit the reader's sympathy for the story's antagonist. Finally, the book becomes a portent: The authors make a strong case for the vulnerability of the Internet, describing its "electronic Maginot lines" and their inadequacy in the face of patient young invaders with powerful tools.

With this extraordinary story and its hard-learned lessons, the authors should make more than a few of their readers wary of staking their privacy on the online world.

Read More Show Less

Product Details

  • ISBN-13: 9780684835587
  • Publisher: Touchstone
  • Publication date: 6/3/1998
  • Edition description: Reprint
  • Pages: 320
  • Sales rank: 984,529
  • Product dimensions: 0.71 (w) x 5.50 (h) x 8.50 (d)

Meet the Author

Charles C. Mann is the author of 1491, which won the U.S. National Academy of Sciences’ Keck award for the best book of the year. A correspondent for The Atlantic Monthly, Science, and Wired, he has covered the intersection of science, technology, and commerce for many newspapers and magazines here and abroad, including the New York Times, Vanity Fair, the Washington Post, and more. In addition to 1491, he was the co-author of four other non-fiction books. He is now working on a companion volume to 1491. His website is

David H. Freedman is a contributing editor for Inc. Magazine, and has written on science, business, and technology for The Atlantic, The New York Times, The Harvard Business Review, Fast Company, Science, Wired, and many other publications. His newest book, Wrong, about why experts keep failing us, came out in June, 2010. His last book (coauthored) was A Perfect Mess, about the useful role of disorder in daily life, business, and science. He is also the author of books about the US Marines, computer crime, and artificial intelligence. Freedman's blog, “Making Sense of Medicine,” takes a close, critical look at medical findings making current headlines with an eye to separating out the frequent hype. He lives near Boston.

Read More Show Less

Read an Excerpt

From Chapter 2: Crazy House

Washington, D.C.

Jim Settle's father had been an FBI agent in Asheville, North Carolina. While other kids were playing baseball, Jim and his twin brother, John, kept the old man company, cruising the lazy, steaming back roads of the nearby Cherokee reservation in a Bureau car, a Nash that was nondescript in a way that screamed G-man to anyone who cared to notice. Settle's father never seemed overly caught up by the job, except when someone got killed on his watch. Jim knew when that had happened: his father would come home with a tight jaw and a silent glare. Usually there was another sign, too. He brought home the corpse's soiled clothes and hung them on the clothesline, where they dried out before being shipped to the Bureau's crime lab. Playing tag in the yard, Jim and John dodged around the bloody, bullet-holed shirts and underwear of killers and stoolies.

Although the brothers were fraternal, not identical, twins, they were uncannily hard to distinguish. Strangers called to them in the street, mistaking one brother for the other. The brothers were close, as twins often are. Together they played high school sports and chased girls. Together they attended Presbyterian College, a tiny institution in Clinton, South Carolina. And together they were swept up into the Vietnam War, although neither actually saw combat. John served his time in Korea. Jim was stationed in Fort Bragg, North Carolina — couldn't make it out of the Carolinas, he liked to joke. He was made commander of an administrative battery charged with tracking and distributing ammunition, supplies, and payroll. It was a low-morale unit, filled with sullen college kids who wanted to be anywhere but Fort Bragg. Settle found he had a knack for working with misfits, though; he could meld them into a team that excelled. Part of the reason for his success was that he secretly thought of himself as a misfit, too. He always took on the oddball assignments.

He didn't look like a misfit. He was a tall man with a sharp, almost birdlike nose. His posture was stiff, almost military; when he walked, he swung his arms in short, choppy arcs. Just enough North Carolina twang remained in his voice to establish his bona fides as a good ol' boy. He had a thick torso that suggested, correctly, that he was on friendly terms with the business end of a beer bottle.

Growing up, Settle had always intended to go to law school. But by the time he left the military, he was supporting a family. He had married his college sweetheart; their daughter was now eighteen months old. Settle found himself thinking, well, Dad has a steady paycheck from the Bureau. The nation's not going to run out of crime in the near future. And the FBI liked legacy kids — they knew Bureau culture. He joined in 1968.

In 1979, after a decade in the streets of Washington, D.C., Settle was asked to join a group of Department of Justice attorneys on a task force investigating federal procurement scams. Most agents avoided this sort of gig — procurement fraud was not the kind of crime that sparkled on a resume. Try telling your next supervisor that while the rest of your office had been taking down murderers and extortionists, you'd been going mano a mano with government waste.

Settle was intrigued, though, because the case involved computers. In the army his brother had been assigned to missile-control systems, which acquainted him with this new technology; Settle had learned a bit, too. Now John was doing well in Hartford, Connecticut, as a computer manager for Traveler's Insurance. Given the opportunity, Settle liked the idea of learning more about these putty-colored boxes that had taken over his brother's life. It would be pleasant, he thought, to spend a little time working with a staff that could put together two consecutive English sentences.

The task force was going after the Computer Sciences Corporation in El Segundo, California, which sold the government time on its mainframe computers — and, according to investigators, overcharging Uncle Sam by millions of dollars. Settle spent months paging through financial records before he figured out the scheme. Washington bought so many services from the firm that as a practical matter it couldn't audit them all. The General Services Administration — the branch of the government that controlled billing — used an accounting program that spot-checked a few items, in much the same way that light-bulb manufacturers test only a few bulbs from every batch. By reading the code, Settle concluded, a Computer Sciences vice-president had figured out which services were being audited and jacked up the prices on the others. (After a three-year legal battle, Computer Sciences settled for almost $3 million but did not admit guilt; the vice-president pleaded no contest to two charges and was fined $20,000.)

Settle was fascinated. Just by deciphering the gibberish in a computer program, an executive had bilked Uncle Sam out of millions. He had stolen in a single year much more money than a bank robber would take in a lifetime of theft, and he had done it from the air-conditioned comfort of his office. When word of this got out, Settle realized, it would change the face of crime. Why would criminals risk their lives mugging people at gunpoint if they could make much more by reaching through the Internet to steal corporate information from an office on the other side of the country? If one wanted to look at crime in business terms — a natural stance for a career FBI agent — then computer misuse was going to be the criminal growth industry of the future.

Copyright © 1997 by David H. Freedman and Charles C. Mann

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted July 14, 2001

    good introduction to people curious about hackers

    Forget what you've seen in movies and on tv...this is a real-life story about a real-life person who 'hacked the planet.'

    1 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)