The Zinn Reader: Writings on Disobedience and Democracy


Howard Zinn - 1997
    It is rare that a historian of the Left has managed to retain as much credibility while refusing to let his academic mantle change his beautiful writing style from being anything but direct, forthright, and accessible. Whether his subject is war, race, politics, economic justice, or history itself, each of his works serves as a reminder that to embrace one's subjectivity can mean embracing one's humanity, that heart and mind can speak with one voice. Here, in six sections, is the historian's own choice of his shorter essays on some of the most critical problems facing America throughout its history, and today.

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

The Perfect Weapon: How the Cyber Arms Race Set the World Afire


David E. Sanger - 2018
    The Perfect Weapon is the riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to American national security. Cheap to acquire, difficult to defend against, and designed to shield their user's identities so as to complicate retaliation, these weapons are capable of an unprecedented range of offensive tactics; they can take us just short of war, allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems. And the vulnerability of those systems has created a related but equally urgent conflict: American companies like Apple and Cisco must claim allegiance to no government in the name of selling secure products around the globe yet the US intelligence agencies want the help of such companies in defending against future cyberattacks. Reported and written with unprecedented access by New York Times chief Washington correspondent and bestselling author David Sanger, The Perfect Weapon takes readers inside war rooms and boardrooms, into the secret cyberdens of American and Chinese military, to give the deep-background story of the increasingly pitched battle between nations, their governments, their cyberwarriors, and their corporations.

Life Inc.: How the World Became a Corporation and How to Take it Back


Douglas Rushkoff - 2009
    Indeed, as Rushkoff shows, most Americans have so willingly adopted the values of corporations that they’re no longer even aware of it.This fascinating journey, from the late Middle Ages to today, reveals the roots of our debacle. From the founding of the first chartered monopoly to the branding of the self; from the invention of central currency to the privatization of banking; from the birth of the modern, self-interested individual to his exploitation through the false ideal of the single-family home; from the Victorian Great Exhibition to the solipsism of MySpace–the corporation has infiltrated all aspects of our daily lives. Life Inc. exposes why we see our homes as investments rather than places to live, our 401(k) plans as the ultimate measure of success, and the Internet as just another place to do business.Most of all, Life Inc. shows how the current financial crisis is actually an opportunity to reverse this six-hundred-year-old trend and to begin to create, invest, and transact directly rather than outsource all this activity to institutions that exist solely for their own sakes. Corporatism didn’t evolve naturally. The landscape on which we are living–the operating system on which we are now running our social software–was invented by people, sold to us as a better way of life, supported by myths, and ultimately allowed to develop into a self-sustaining reality. It is a map that has replaced the territory. Rushkoff illuminates both how we’ve become disconnected from our world and how we can reconnect to our towns, to the value we can create, and, mostly, to one another. As the speculative economy collapses under its own weight, Life Inc. shows us how to build a real and human-scaled society to take its place.

Idiot America: How Stupidity Became a Virtue in the Land of the Free


Charles P. Pierce - 2008
    Wearing a saddle.... But worse than this was when the proprietor exclaimed to a cheering crowd, “We are taking the dinosaurs back from the evolutionists!” He knew then and there it was time to try and salvage the Land of the Enlightened, buried somewhere in this new Home of the Uninformed.With his razor-sharp wit and erudite reasoning, Pierce delivers a gut-wrenching, side-splitting lament about the glorification of ignorance in the United States, and how a country founded on intellectual curiosity has somehow deteriorated into a nation of simpletons more apt to vote for an American Idol contestant than a presidential candidate.With Idiot America, Pierce's thunderous denunciation is also a secret call to action, as he hopes that somehow, being intelligent will stop being a stigma, and that pinheads will once again be pitied, not celebrated.

LikeWar: The Weaponization of Social Media


P.W. Singer - 2018
    This urgent report is required reading, from defense expert P.W. Singer and Council on Foreign Relations fellow Emerson Brooking.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Database Nation: The Death of Privacy in the 21st Century


Simson Garfinkel - 2000
    Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

The Future of the Internet and How to Stop It


Jonathan L. Zittrain - 2008
    With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

Click: What Millions of People are Doing Online and Why It Matters


Bill Tancer - 2008
    As online directories replace the yellow pages, search engines replace traditional research, and news sites replace newsprint, we are in an age in which we've come to rely tremendously on the Internet--leaving behind a trail of information about ourselves as a culture and the direction in which we are headed. With surprising and practical insight, Tancer demonstrates how the Internet is changing the way we absorb information and how understanding that change can be used to our advantage in business and in life.Click analyzes the new generation of consumerism in a way no other book has before, showing how we use the Internet, and how those trends provide a wealth of market research nearly as vast as the Internet itself. Understanding how we change is integral to our success. After all, we are what we click.

Writing on the Wall: Social Media - The First 2,000 Years


Tom Standage - 2013
    Indeed, as Tom Standage reveals in his scintillating new book, social media is anything but a new phenomenon.From the papyrus letters that Roman statesmen used to exchange news across the Empire to the advent of hand-printed tracts of the Reformation to the pamphlets that spread propaganda during the American and French revolutions, Standage chronicles the increasingly sophisticated ways people shared information with each other, spontaneously and organically, down the centuries. With the rise of newspapers in the nineteenth century, then radio and television, “mass media” consolidated control of information in the hands of a few moguls. However, the Internet has brought information sharing full circle, and the spreading of news along social networks has reemerged in powerful new ways.A fresh, provocative exploration of social media over two millennia, Writing on the Wall reminds us how modern behavior echoes that of prior centuries-the Catholic Church, for example, faced similar dilemmas in deciding whether or how to respond to Martin Luther's attacks in the early sixteenth century to those that large institutions confront today in responding to public criticism on the Internet. Invoking the likes of Thomas Paine and Vinton Cerf, co-inventor of the Internet, Standage explores themes that have long been debated: the tension between freedom of expression and censorship; whether social media trivializes, coarsens or enhances public discourse; and its role in spurring innovation, enabling self-promotion, and fomenting revolution. As engaging as it is visionary, Writing on the Wall draws on history to cast new light on today's social media and encourages debate and discussion about how we'll communicate in the future.

Tribe: On Homecoming and Belonging


Sebastian Junger - 2016
    These are the very same behaviors that typify good soldiering and foster a sense of belonging among troops, whether they’re fighting on the front lines or engaged in non-combat activities away from the action. Drawing from history, psychology, and anthropology, bestselling author Sebastian Junger shows us just how at odds the structure of modern society is with our tribal instincts, arguing that the difficulties many veterans face upon returning home from war do not stem entirely from the trauma they’ve suffered, but also from the individualist societies they must reintegrate into.A 2011 study by the Canadian Forces and Statistics Canada reveals that 78 percent of military suicides from 1972 to the end of 2006 involved veterans. Though these numbers present an implicit call to action, the government is only just taking steps now to address the problems veterans face when they return home. But can the government ever truly eliminate the challenges faced by returning veterans? Or is the problem deeper, woven into the very fabric of our modern existence? Perhaps our circumstances are not so bleak, and simply understanding that beneath our modern guises we all belong to one tribe or another would help us face not just the problems of our nation but of our individual lives as well.Well-researched and compellingly written, this timely look at how veterans react to coming home will reconceive our approach to veteran’s affairs and help us to repair our current social dynamic.

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News


Eliot Higgins - 2021
    Soon, the identity of one of the suspects was revealed: he was a Russian spy. This huge investigative coup wasn't pulled off by an intelligence agency or a traditional news outlet. Instead, the scoop came from Bellingcat, the open-source investigative team that is redefining the way we think about news, politics, and the digital future.We Are Bellingcat tells the inspiring story of how a college dropout pioneered a new category of reporting and galvanized citizen journalists-working together from their computer screens around the globe-to crack major cases, at a time when fact-based journalism is under assault from authoritarian forces. Founder Eliot Higgins introduces readers to the tools Bellingcat investigators use, tools available to anyone, from software that helps you pinpoint the location of an image, to an app that can nail down the time that photo was taken. This book digs deep into some of Bellingcat's most important investigations-the downing of flight MH17 over Ukraine, Assad's use of chemical weapons in Syria, the identities of alt-right protestors in Charlottesville-with the drama and gripping detail of a spy novel.