Book picks similar to
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan
cyber
technology
non-fiction
politics
Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety
Eric Schlosser - 2013
A groundbreaking account of accidents, near misses, extraordinary heroism, and technological breakthroughs, Command and Control explores the dilemma that has existed since the dawn of the nuclear age: How do you deploy weapons of mass destruction without being destroyed by them? That question has never been resolved—and Schlosser reveals how the combination of human fallibility and technological complexity still poses a grave risk to mankind. While the harms of global warming increasingly dominate the news, the equally dangerous yet more immediate threat of nuclear weapons has been largely forgotten.Written with the vibrancy of a first-rate thriller, Command and Control interweaves the minute-by-minute story of an accident at a nuclear missile silo in rural Arkansas with a historical narrative that spans more than fifty years. It depicts the urgent effort by American scientists, policy makers, and military officers to ensure that nuclear weapons can’t be stolen, sabotaged, used without permission, or detonated inadvertently. Schlosser also looks at the Cold War from a new perspective, offering history from the ground up, telling the stories of bomber pilots, missile commanders, maintenance crews, and other ordinary servicemen who risked their lives to avert a nuclear holocaust. At the heart of the book lies the struggle, amid the rolling hills and small farms of Damascus, Arkansas, to prevent the explosion of a ballistic missile carrying the most powerful nuclear warhead ever built by the United States.Drawing on recently declassified documents and interviews with people who designed and routinely handled nuclear weapons, Command and Control takes readers into a terrifying but fascinating world that, until now, has been largely hidden from view. Through the details of a single accident, Schlosser illustrates how an unlikely event can become unavoidable, how small risks can have terrible consequences, and how the most brilliant minds in the nation can only provide us with an illusion of control. Audacious, gripping, and unforgettable, Command and Control is a tour de force of investigative journalism, an eye-opening look at the dangers of America’s nuclear age.
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Marcus J. Carey - 2019
Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers and shatter ceilings. It's about time.This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms. What tips do the founders of Dragos, Inc. and Duo Security have on starting a company? Do you need a college degree or certification to be a cybersecurity professional? What is the biggest bang-for-the-buck action your organization can take to improve its cybersecurity posture? What "life hacks" to real hackers use to make their own lives easier? What resources can women in cybersecurity utilize to maximize their potential?All proceeds from the book will go towards: Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid's Club.We can't wait to show you the most epic cybersecurity thought leadership collaborative effort, ever.(Source: Amazon.com)
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
T-Minus AI: Humanity’s Countdown to Artificial Intelligence and the New Pursuit of Global Power
Michael Kanaan - 2020
China delivered a bold message when it released a national plan to dominate all aspects of AI across the planet. Within weeks, Russia's Vladimir Putin raised the stakes by declaring AI the future for all humankind, and proclaiming that, "Whoever becomes the leader in this sphere will become the ruler of the world."The race was on. Consistent with their unique national agendas, countries throughout the world began plotting their paths and hurrying their pace. Now, not long after, the race has become a sprint.Despite everything at risk, for most of us AI remains shrouded by a cloud of mystery and misunderstanding. Hidden behind complex technical terms and confused even further by extravagant depictions in science fiction, the realities of AI and its profound implications are hard to decipher, but no less crucial to understand.In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that's easy to comprehend. A recognized national expert and the U.S. Air Force's first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.Kanaan also illuminates the global implications of AI by highlighting the cultural and national vulnerabilities already exposed and the pressing issues now squarely on the table. AI has already become China's all-purpose tool to impose authoritarian influence around the world. Russia, playing catch up, is weaponizing AI through its military systems and now infamous, aggressive efforts to disrupt democracy by whatever disinformation means possible.America and like-minded nations are awakening to these new realities, and the paths they're electing to follow echo loudly, in most cases, the political foundations and moral imperatives upon which they were formed.As we march toward a future far different than ever imagined, T-Minus AI is fascinating and critically well-timed. It leaves the fiction behind, paints the alarming implications of AI for what they actually are, and calls for unified action to protect fundamental human rights and dignities for all.
The Origins of Political Order: From Prehuman Times to the French Revolution
Francis Fukuyama - 2011
Some went on to create governments that were accountable to their constituents. We take these institutions for granted, but they are absent or are unable to perform in many of today’s developing countries—with often disastrous consequences for the rest of the world.Francis Fukuyama, author of the bestselling The End of History and the Last Man and one of our most important political thinkers, provides a sweeping account of how today’s basic political institutions developed. The first of a major two-volume work, The Origins of Political Order begins with politics among our primate ancestors and follows the story through the emergence of tribal societies, the growth of the first modern state in China, the beginning of the rule of law in India and the Middle East, and the development of political accountability in Europe up until the eve of the French Revolution.Drawing on a vast body of knowledge—history, evolutionary biology, archaeology, and economics—Fukuyama has produced a brilliant, provocative work that offers fresh insights on the origins of democratic societies and raises essential questions about the nature of politics and its discontents.
In the Camps: China's High-Tech Penal Colony
Darren Byler - 2021
Based on hours of interviews with camp survivors and workers, thousands of government documents, and over a decade of research, Darren Byler, one of the leading experts on Uyghur society and Chinese surveillance systems, uncovers how a vast network of technology provided by private companies―facial surveillance, voice recognition, smartphone data―enabled the state and corporations to blacklist millions of Uyghurs because of their religious and cultural practice starting in 2017. Charged with “pre-crimes” that sometimes consist only of installing social media apps, detainees were put in camps to “study”―forced to praise the Chinese government, renounce Islam, disavow families, and labor in factories. Byler travels back to Xinjiang to reveal how the convenience of smartphones have doomed the Uyghurs to catastrophe, and makes the case that the technology is being used all over the world, sold by tech companies from Beijing to Seattle producing new forms of unfreedom for vulnerable people around the world.
The Sword and the Shield: The Mitrokhin Archive & the Secret History of the KGB
Christopher Andrew - 1985
Vasili Mitrokhin, a secret dissident who worked in the KGB archive, smuggled out copies of its most highly classified files every day for twelve years. In 1992, a U.S. ally succeeded in exfiltrating the KGB officer and his entire archive out of Moscow. The archive covers the entire period from the Bolshevik Revolution to the 1980s and includes revelations concerning almost every country in the world. But the KGB's main target, of course, was the United States. Though there is top-secret material on almost every country in the world, the United States is at the top of the list. As well as containing many fascinating revelations, this is a major contribution to the secret history of the twentieth century. Among the topics and revelations explored are: The KGB's covert operations in the United States and throughout the West, some of which remain dangerous today. KGB files on Oswald and the JFK assassination that Boris Yeltsin almost certainly has no intention of showing President Clinton. The KGB's attempts to discredit civil rights leader in the 1960s, including its infiltration of the inner circle of a key leader. The KGB's use of radio intercept posts in New York and Washington, D.C., in the 1970s to intercept high-level U.S. government communications. The KGB's attempts to steal technological secrets from major U.S. aerospace and technology corporations. KGB covert operations against former President Ronald Reagan, which began five years before he became president. KGB spies who successfully posed as U.S. citizens under a series of ingenious disguises, including several who attained access to the upper echelons of New York society.
Lee Kuan Yew: The Grand Master's Insights on China, the United States, and the World
Graham Allison - 2013
Lee, the founding father of modern Singapore and its prime minister from 1959 to 1990, has honed his wisdom during more than fifty years on the world stage. Almost single-handedly responsible for transforming Singapore into a Western-style economic success, he offers a unique perspective on the geopolitics of East and West. American presidents from Richard Nixon to Barack Obama have welcomed him to the White House; British prime ministers from Margaret Thatcher to Tony Blair have recognized his wisdom; and business leaders from Rupert Murdoch to Rex Tillerson, CEO of Exxon Mobil, have praised his accomplishments. This book gathers key insights from interviews, speeches, and Lee's voluminous published writings and presents them in an engaging question and answer format.Lee offers his assessment of China's future, asserting, among other things, that "China will want to share this century as co-equals with the U.S." He affirms the United States' position as the world's sole superpower but expresses dismay at the vagaries of its political system. He offers strategic advice for dealing with China and goes on to discuss India's future, Islamic terrorism, economic growth, geopolitics and globalization, and democracy. Lee does not pull his punches, offering his unvarnished opinions on multiculturalism, the welfare state, education, and the free market. This little book belongs on the reading list of every world leader--including the one who takes the oath of office on January 20, 2013.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age
Michael A. Hiltzik - 1999
And they did it without fanfare or recognition from their employer. Hiltzik's Dealers of Lightning provides a fascinating look at technohistory that sets the record straight. In Dealers of Lightning, Hiltzik describes the forces and faces behind the revolution that the Xerox PARC team single-handedly spawned. The Xerox PARC group was composed solely of top technical minds. The decision was made at Xerox headquarters to give the team complete freedom from deadlines and directives, in hopes of fostering a true creative environment. It worked perhaps too well. The team responded with a steady output of amazing technology, including the first version of the Internet, the first personal computer, user-friendly word-processing programs, and pop-up menus. Xerox, far from ready for the explosion of innovation, failed to utilize the technology dreamed up by the group. Out of all the dazzling inventions born at Xerox PARC, only a handful were developed and marketed by Xerox. However, one of these inventions, the laser printer, proved successful enough to earn billions for the company, therefore justifying its investment in the research center. Most oftheteam's creations would go on to be developed and perfected by other companies, such as IBM, Apple, and Microsoft. Drawing from interviews with the engineers, executives, and scientists involved in the Xerox PARC, Dealers of Lightning chronicles an amazing era of egos, ideas, and inventions at the dawn of the computer age.
Zero Day: The Threat In Cyberspace
Robert O'Harrow Jr. - 2013
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Mark Dowd - 2006
Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.
DarkMarket: Cyberthieves, Cybercops and You
Misha Glenny - 2011
The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.
The Assassination Complex: Inside the Government's Secret Drone Warfare Program
Jeremy Scahill - 2016
A must-read for concerned citizens” (Library Journal, starred review) from bestselling author Jeremy Scahill and his colleagues at the investigative website The Intercept.Drones are a tool, not a policy. The policy is assassination. But drone strikes often kill people other than the intended target. These deaths, which have included women and children, dwarf the number of actual combatants who have been assassinated by drones. They have generated anger toward the United States among foreign populations and have even become a recruiting tool for jihadists.The first drone strike outside a declared war zone was conducted more than twelve years ago, but it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. However, there was no explanation of the internal process used to determine whether a suspect should be killed without being indicted or tried, even if that suspect is an American citizen. The implicit message of the Obama administration has been: Trust, but don’t verify. The Assassination Complex reveals stunning details of the government’s secretive drone warfare program based on documents supplied by a confidential source in the intelligence community. These documents make it possible to begin the long-overdue debate about the policy of drone warfare and how it is conducted. The Assassination Complex allows us to understand at last the circumstances under which the US government grants itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal—“readers will be left in no doubt that drone warfare affronts morality and the Constitution” (Kirkus Reviews).