Book picks similar to
Habeas Data: Privacy vs. the Rise of Surveillance Tech by Cyrus Farivar
non-fiction
technology
nonfiction
politics
The Right to Privacy
Ellen Alderman - 1995
Yet in arenas that range from the battlefield of abortion to the information highway, privacy is under siege. In this eye-opening and sometimes hair-raising book, Alderman and Kennedy survey hundreds of recent cases in which ordinary citizens have come up against the intrusions of government, businesses, the news media, and their own neighbors. At once shocking and instructive, up-to-date and rich in historical perspective, The Right to Private is an invaluable guide to one of the most charged issues of our time."Anyone hoping to understand the sometimes precarious state of privacy in modern America should start by reading this book."--Washington Post Book World"Skillfully weaves together unfamiliar, dramatic case histories...a book with impressive breadth."--Time
The Tyranny of Big Tech
Josh Hawley - 2021
In The Tyranny of Big Tech, Senator Josh Hawley of Missouri argues that these mega-corporations - controlled by the robber barons of the modern era - are the gravest threat to American liberty in decades.To reverse course, Hawley argues, we must correct progressives’ mistakes of the past. That means recovering the link between liberty and democratic participation, building an economy that makes the working class strong, independent, and beholden to no one, and curbing the influence of corporate and political elites.Big Tech and its allies do not deal gently with those who cross them, and Senator Hawley proudly bears his own battle scars. But hubris is dangerous. The time is ripe to overcome the tyranny of Big Tech by reshaping the business and legal landscape of the digital world.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
John P. Carlin - 2018
We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us.As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed.The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
The Mueller Report
The Washington Post - 2019
This edition from The Washington Post/Scribner contains: —The long-awaited Report On The Investigation Into Russian Interference In The 2016 Presidential Election —An introduction by The Washington Post titled “A President, a Prosecutor, and the Protection of American Democracy” —A timeline of the major events of the Special Counsel’s investigation from May 2017, when Robert Mueller was appointed, to the report's delivery —A guide to individuals involved, including in the Special Counsel’s Office, the Department of Justice, the FBI, the Trump Campaign, the White House, the Trump legal defense team, and the Russians —Key documents in the Special Counsel’s investigation, including filings pertaining to General Michael T. Flynn, Paul Manafort, Michael Cohen, Roger Stone, and the Russian internet operation in St. Petersburg. Each document is introduced and explained by Washington Post reporters. One of the most urgent and important investigations ever conducted, the Mueller inquiry focuses on Donald Trump, his presidential campaign, and Russian interference in the 2016 election, and draws on the testimony of dozens of witnesses and the work of some of the country’s most seasoned prosecutors. The special counsel’s investigation looms as a turning point in American history. The Mueller Report is essential reading for all citizens concerned about the fate of the presidency and the future of our democracy.
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
Who Controls the Internet?: Illusions of a Borderless World
Jack L. Goldsmith - 2006
It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them.While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance.Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
We See It All: Liberty and Justice in an Age of Perpetual Surveillance
Jon Fasman - 2021
Embedding himself within police departments on both coasts, Fasman explores the moral, legal, and political questions posed by these techniques and tools.By zeroing in on how facial recognition, automatic license-plate readers, drones, predictive algorithms, and encryption affect us personally, Fasman vividly illustrates what is at stake and explains how to think through issues of privacy rights, civil liberties, and public safety. How do these technologies impact how police operate in our society? How should archaic privacy laws written for an obsolete era—that of the landline and postbox—be updated?Fasman looks closely at what can happen when surveillance technologies are combined and put in the hands of governments with scant regard for citizens’ civil liberties, pushing us to ask: Is our democratic culture strong enough to stop us from turning into China, with its architecture of control?
Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age
Susan P. Crawford - 2013
With some of the fastest speeds and lowest prices in the world for high-speed Internet access, the nation was poised to be the global leader in the new knowledge-based economy. Today that global competitive advantage has all but vanished because of a series of government decisions and resulting monopolies that have allowed dozens of countries, including Japan and South Korea, to pass us in both speed and price of broadband. This steady slide backward not only deprives consumers of vital services needed in a competitive employment and business market—it also threatens the economic future of the nation.This important book by leading telecommunications policy expert Susan Crawford explores why Americans are now paying much more but getting much less when it comes to high-speed Internet access. Using the 2011 merger between Comcast and NBC Universal as a lens, Crawford examines how we have created the biggest monopoly since the breakup of Standard Oil a century ago. In the clearest terms, this book explores how telecommunications monopolies have affected the daily lives of consumers and America's global economic standing.
Database Nation: The Death of Privacy in the 21st Century
Simson Garfinkel - 2000
Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.
iWar: War and Peace in the Information Age
Bill Gertz - 2017
Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
David E. Sanger - 2018
The Perfect Weapon is the riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to American national security. Cheap to acquire, difficult to defend against, and designed to shield their user's identities so as to complicate retaliation, these weapons are capable of an unprecedented range of offensive tactics; they can take us just short of war, allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems. And the vulnerability of those systems has created a related but equally urgent conflict: American companies like Apple and Cisco must claim allegiance to no government in the name of selling secure products around the globe yet the US intelligence agencies want the help of such companies in defending against future cyberattacks. Reported and written with unprecedented access by New York Times chief Washington correspondent and bestselling author David Sanger, The Perfect Weapon takes readers inside war rooms and boardrooms, into the secret cyberdens of American and Chinese military, to give the deep-background story of the increasingly pitched battle between nations, their governments, their cyberwarriors, and their corporations.
Don't Be Evil: How Big Tech Betrayed Its Founding Principles -- and All of Us
Rana Foroohar - 2019
Today, the utopia they sought to create is looking more dystopian than ever: from digital surveillance and the loss of privacy to the spreading of misinformation and hate speech to predatory algorithms targeting the weak and vulnerable to products that have been engineered to manipulate our desires. How did we get here? How did these once-scrappy and idealistic enterprises become rapacious monopolies with the power to corrupt our elections, co-opt all our data, and control the largest single chunk of corporate wealth—while evading all semblance of regulation and taxes? In Don’t Be Evil, Financial Times global business columnist Rana Foroohar tells the story of how Big Tech lost its soul—and ate our lunch. Through her skilled reporting and unparalleled access—won through nearly thirty years covering business and technology—she shows the true extent to which behemoths like Google, Facebook, Apple, and Amazon are monetizing both our data and our attention, without us seeing a penny of those exorbitant profits. Finally, Foroohar lays out a plan for how we can resist, by creating a framework that fosters innovation while also protecting us from the dark side of digital technology.Praise for
Don’t Be Evil
“At first sight, Don’t Be Evil looks like it’s doing for Google what muckraking journalist Ida Tarbell did for Standard Oil over a century ago. But this whip-smart, highly readable book’s scope turns out to be much broader. Worried about the monopolistic tendencies of big tech? The addictive apps on your iPhone? The role Facebook played in Donald Trump’s election? Foroohar will leave you even more worried, but a lot better informed.”—Niall Ferguson, Milbank Family Senior Fellow at the Hoover Institution, Stanford, and author of The Square and the Tower
Technocreep: The Surrender of Privacy and the Capitalization of Intimacy
Thomas P. Keenan - 2014
Going to a Disney theme park? Your creepy new “MagicBand” will alert Minnie Mouse so she’ll know your kid’s name when you approach her. Thinking about sending your DNA to Ancestry.com for some “genetic genealogy”? Careful: your genetic information could be used against you.
The Hardware Hacker: Adventures in Making and Breaking Hardware
Andrew Huang - 2017
In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.