Book picks similar to
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan
cyber
technology
cybersecurity
non-fiction
Thieves of State: Why Corruption Threatens Global Security
Sarah Chayes - 2015
Every day a new blaze seems to ignite: the bloody implosion of Iraq and Syria; the East-West standoff in Ukraine; abducted schoolgirls in Nigeria. Is there some thread tying these frightening international security crises together? In a riveting account that weaves history with fast-moving reportage and insider accounts from the Afghanistan war, Sarah Chayes identifies the unexpected link: corruption.Since the late 1990s, corruption has reached such an extent that some governments resemble glorified criminal gangs, bent solely on their own enrichment. These kleptocrats drive indignant populations to extremes—ranging from revolution to militant puritanical religion. Chayes plunges readers into some of the most venal environments on earth and examines what emerges: Afghans returning to the Taliban, Egyptians overthrowing the Mubarak government (but also redesigning Al-Qaeda), and Nigerians embracing both radical evangelical Christianity and the Islamist terror group Boko Haram. In many such places, rigid moral codes are put forth as an antidote to the collapse of public integrity.The pattern, moreover, pervades history. Through deep archival research, Chayes reveals that canonical political thinkers such as John Locke and Machiavelli, as well as the great medieval Islamic statesman Nizam al-Mulk, all named corruption as a threat to the realm. In a thrilling argument connecting the Protestant Reformation to the Arab Spring, Thieves of State presents a powerful new way to understand global extremism. And it makes a compelling case that we must confront corruption, for it is a cause—not a result—of global instability.
Facts and Fears: Hard Truths from a Life in Intelligence
James R. Clapper - 2018
In Facts and Fears Clapper traces his career through his rise in ranks of the military, the history of several decades of national intelligence operations, the growing threat of cyberattacks, his relationships with presidents and Congress, and the truth about Russia's role in the presidential election. He describes, in the wake of Snowden and WikiLeaks, his efforts to make intelligence more transparent and to push back against the suspicion that Americans' private lives are subject to surveillance. Clapper considers such difficult questions as, is intelligence ethical? Is it moral to use human sources to learn secrets, to intercept communications, to take pictures of closed societies from orbit? What are the limits of what we should be allowed to do? What protections should we give to the private citizens of the world, not to mention our fellow Americans? Is there a time that intelligence officers can lose credibility as unbiased reporters of hard truths by asserting themselves into policy decisions?
Prisoners of Geography: Ten Maps That Tell You Everything You Need to Know About Global Politics
Tim Marshall - 2015
Their choices are limited by mountains, rivers, seas, and concrete. To understand world events, news organizations and other authorities often focus on people, ideas, and political movements, but without geography, we never have the full picture. Now, in the relevant and timely Prisoners of Geography, seasoned journalist Tim Marshall examines Russia, China, the USA, Latin America, the Middle East, Africa, Europe, Japan and Korea, and Greenland and the Arctic—their weather, seas, mountains, rivers, deserts, and borders—to provide a context often missing from our political reportage: how the physical characteristics of these countries affect their strengths and vulnerabilities and the decisions made by their leaders.In ten, up-to-date maps of each region, Marshall explains in clear and engaging prose the complex geo-political strategies of these key parts of the globe. What does it mean that Russia must have a navy, but also has frozen ports six months a year? How does this affect Putin’s treatment of Ukraine? How is China’s future constrained by its geography? Why will Europe never be united? Why will America never be invaded? Shining a light on the unavoidable physical realities that shape all of our aspirations and endeavors, Prisoners of Geography is the critical guide to one of the major (and most often overlooked) determining factors in world history.
In the Shadows of the American Century: The Rise and Decline of US Global Power
Alfred W. McCoy - 2017
McCoy then analyzes the marquee instruments of American hegemony—covert intervention, client elites, psychological torture, and worldwide surveillance.Alfred McCoy’s 2009 book Policing America’s Empire won the Kahin Prize from the Association for Asian Studies.
Hate Crimes in Cyberspace
Danielle Keats Citron - 2014
Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims.Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker’s “revenge porn” were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs.Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.
The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth
Mark Mazzetti - 2013
The Way of the Knife is the untold story of that shadow war: a campaign that has blurred the lines between soldiers and spies and lowered the bar for waging war across the globe. America has pursued its enemies with killer drones and special operations troops; trained privateers for assassination missions and used them to set up clandestine spying networks; and relied on mercurial dictators, untrustworthy foreign intelligence services, and proxy armies.This new approach to war has been embraced by Washington as a lower risk, lower cost alternative to the messy wars of occupation and has been championed as a clean and surgical way of conflict. But the knife has created enemies just as it has killed them. It has fomented resentments among allies, fueled instability, and created new weapons unbound by the normal rules of accountability during wartime.
America's Secret War: Inside the Hidden Worldwide Struggle Between the United States and Its Enemies
George Friedman - 2004
government. Now Friedman delivers the geopolitical story that the mainstream media has been unable to uncover — the startling truth behind America’s foreign policy and war effort in Afghanistan, Iraq, and beyond.Stratfor, one of the world’s most respected private global intelligence firms, has an unmatched ability to provide clear perspective on the current geopolitical map. In America's Secret War, George Friedman identifies the United States’ most dangerous enemies, delves into presidential strategies of the last quarter century, and reveals the real reasons behind the attack of 9/11—and the Bush administration’s motivation for the war in Iraq. It describes in eye-opening detail America’s covert and overt efforts in the global war against terrorism: Not only are U.S. armies in combat on every continent, but since 9/11 the intelligence services of dozens of nations have been operating in close partnership with the CIA.Drawing on Stratfor’s vast information-gathering network, Friedman presents an insightful picture of today’s world that goes far beyond what is reported on television and in other news media. Al Qaeda’s war plans and how they led to 9/11The threat of a suitcase nuclear bomb in New York and how that changed the course of the war.The deal the U.S. made with Russia and Iran which made the invasion of Afghanistan possible – and how those deals affect the United States today.How fear and suspicion of the Saudis after 9-11 tore apart the Bush-Saudi relationship and why Saudi Arabia’s closest friends in the administration became the Saudi’s worst enemies.The real reasons behind George W. Bush’s invasion of Iraq and how WMD became the cover for a much deeper game.How the CIA miscalculated about Saddam Hussein’s and Iran’s real plans, leaving the U.S. bogged down in the war.How the war in Iraq began with a ruse, pretending that a “target of opportunity” attack on Saddam Hussein had presented itself. The real story about why the U.S. raises and lowers its alert status and why the United States can’t find and destroy al Qaeda.The strategic successes that are slowly leading the United States to victoryAmerica's Secret War is an unprecedented look at the new world war being waged behind-the-scenes today. It is sure to stir debate and capture headlines around the world.
All the Shah's Men: An American Coup and the Roots of Middle East Terror
Stephen Kinzer - 2003
The victim was Mohammad Mossadegh, the democratically elected prime minister of Iran. Although the coup seemed a success at first, today it serves as a chilling lesson about the dangers of foreign intervention.In this book, veteran New York Times correspondent Stephen Kinzer gives the first full account of this fateful operation. His account is centered around an hour-by-hour reconstruction of the events of August 1953, and concludes with an assessment of the coup's "haunting and terrible legacy."Operation Ajax, as the plot was code-named, reshaped the history of Iran, the Middle East, and the world. It restored Mohammad Reza Shah to the Peacock Throne, allowing him to impose a tyranny that ultimately sparked the Islamic Revolution of 1979. The Islamic Revolution, in turn, inspired fundamentalists throughout the Muslim world, including the Taliban and terrorists who thrived under its protection."It is not far-fetched," Kinzer asserts in this book, "to draw a line from Operation Ajax through the Shah's repressive regime and the Islamic Revolution to the fireballs that engulfed the World Trade Center in New York."Drawing on research in the United States and Iran, and using material from a long-secret CIA report, Kinzer explains the background of the coup and tells how it was carried out. It is a cloak-and-dagger story of spies, saboteurs, and secret agents. There are accounts of bribes, staged riots, suitcases full of cash, and midnight meetings between the Shah and CIA agent Kermit Roosevelt, who was smuggled in and out of the royal palace under a blanket in the back seat of a car. Roosevelt,the grandson of President Theodore Roosevelt, was a real-life James Bond in an era when CIA agents operated mainly by their wits. After his first coup attempt failed, he organized a second attempt that succeeded three days later.The colorful cast of characters includes the terrified young Shah, who fled his country at the first sign of trouble; General H. Norman Schwarzkopf, father of the Gulf War commander and the radio voice of "Gang Busters," who flew to Tehran on a secret mission that helped set the coup in motion; and the fiery Prime Minister Mossadegh, who outraged the West by nationalizing the immensely profitable Anglo-Iranian Oil Company. The British, outraged by the seizure of their oil company, persuaded President Dwight Eisenhower that Mossadegh was leading Iran toward Communism. Eisenhower and Prime Minister Winston Churchill of Great Britain became the coup's main sponsors.Brimming with insights into Middle Eastern history and American foreign policy, this book is an eye-opening look at an event whose unintended consequences - Islamic revolution and violent anti-Americanism--have shaped the modern world. As the United States assumes an ever-widening role in the Middle East, it is essential reading.
Alan Turing: Unlocking the Enigma
David Boyle - 2014
Turing’s openness about his homosexuality at a time when it was an imprisonable offense ultimately led to his untimely lo death at the age of only forty-one. In Alan Turing: Unlocking the Enigma, David Boyle reveals the mysteries behind the man and his remarkable career. Aged just 22, Turing was elected a fellow at King's College, Cambridge on the strength of a dissertation in which he proved the central limit theorem. By the age of 33, he had been awarded the OBE by King George VI for his wartime services: Turing was instrumental in cracking the Nazi Enigma machines at the top secret code breaking establishment at Bletchley Park during the Second World War.But his achievements were to be tragically overshadowed by the paranoia of the post-War years. Hounded for his supposedly subversive views and for his sexuality, Turing was prosecuted in 1952, and forced to accept the humiliation of hormone treatment to avoid a prison sentence. Just two years later, at the age of 41 he was dead. The verdict: cyanide poisoning.Was Turing’s death accidental as his mother always claimed? Or did persistent persecution drive him to take him own life?Alan Turing: Unlocking the Enigma seeks to find the man behind the science, illuminating the life of a person who is still a shadowy presence behind his brilliant achievements.
How Everything Became War and the Military Became Everything: Tales from the Pentagon
Rosa Brooks - 2016
Today, America’s wars are everywhere and forever: our enemies change constantly and rarely wear uniforms, and virtually anything can become a weapon. As war expands, so does the role of the US military. Today, military personnel don’t just “kill people and break stuff.” Instead, they analyze computer code, train Afghan judges, build Ebola isolation wards, eavesdrop on electronic communications, develop soap operas, and patrol for pirates. You name it, the military does it. Rosa Brooks traces this seismic shift in how America wages war from an unconventional perspective—that of a former top Pentagon official who is the daughter of two anti-war protesters and a human rights activist married to an Army Green Beret. Her experiences lead her to an urgent warning: When the boundaries around war disappear, we risk destroying America’s founding values and the laws and institutions we’ve built—and undermining the international rules and organizations that keep our world from sliding towards chaos. If Russia and China have recently grown bolder in their foreign adventures, it’s no accident; US precedents have paved the way for the increasingly unconstrained use of military power by states around the globe. Meanwhile, we continue to pile new tasks onto the military, making it increasingly ill-prepared for the threats America will face in the years to come. By turns a memoir, a work of journalism, a scholarly exploration into history, anthropology and law, and a rallying cry, How Everything Became War and the Military Became Everything transforms the familiar into the alien, showing us that the culture we inhabit is reshaping us in ways we may suspect, but don’t really understand. It’s the kind of book that will leave you moved, astonished, and profoundly disturbed, for the world around us is quietly changing beyond recognition—and time is running out to make things right.
This Is Not Propaganda: Adventures in the War Against Reality
Peter Pomerantsev - 2019
In this surreal atmosphere created to disorient us and undermine our sense of truth, we’ve lost not only our grip on peace and democracy — but our very notion of what those words even mean.Peter Pomerantsev takes us to the front lines of the disinformation age, where he meets Twitter revolutionaries and pop-up populists, “behavioral change” salesmen, Jihadi fanboys, Identitarians, truth cops, and many others. Forty years after his dissident parents were pursued by the KGB, Pomerantsev finds the Kremlin re-emerging as a great propaganda power. His research takes him back to Russia — but the answers he finds there are not what he expected.Blending reportage, family history, and intellectual adventure, This Is Not Propaganda explores how we can reimagine our politics and ourselves when reality seems to be coming apart.
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden from the Soviet Invasion to September 10, 2001
Steve Coll - 2004
It won the Pulitzer Prize in 2005.Prize-winning journalist Steve Coll has spent years reporting from the Middle East, accessed previously classified government files and interviewed senior US officials and foreign spymasters. Here he gives the full inside story of the CIA's covert funding of an Islamic jihad against Soviet forces in Afghanistan, explores how this sowed the seeds of Bin Laden's rise, traces how he built his global network and brings to life the dramatic battles within the US government over national security. Above all, he lays bare American intelligence's continual failure to grasp the rising threat of terrorism in the years leading to 9/11 - and its devastating consequences.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon - 2009
From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries