Book picks similar to
Law and Internet Cultures by Kathy Bowrey
an-university-courses
cyberlaw
internet
law
Free Speech: Ten Principles for a Connected World
Timothy Garton Ash - 2016
If we have Internet access, any one of us can publish almost anything we like and potentially reach an audience of millions. Never was there a time when the evils of unlimited speech flowed so easily across frontiers: violent intimidation, gross violations of privacy, tidal waves of abuse. A pastor burns a Koran in Florida and UN officials die in Afghanistan. Drawing on a lifetime of writing about dictatorships and dissidents, Timothy Garton Ash argues that in this connected world that he calls cosmopolis, the way to combine freedom and diversity is to have more but also better free speech. Across all cultural divides we must strive to agree on how we disagree. He draws on a thirteen-language global online project—freespeechdebate.com—conducted out of Oxford University and devoted to doing just that. With vivid examples, from his personal experience of China's Orwellian censorship apparatus to the controversy around Charlie Hebdo to a very English court case involving food writer Nigella Lawson, he proposes a framework for civilized conflict in a world where we are all becoming neighbors.
We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Eliot Higgins - 2021
Soon, the identity of one of the suspects was revealed: he was a Russian spy. This huge investigative coup wasn't pulled off by an intelligence agency or a traditional news outlet. Instead, the scoop came from Bellingcat, the open-source investigative team that is redefining the way we think about news, politics, and the digital future.We Are Bellingcat tells the inspiring story of how a college dropout pioneered a new category of reporting and galvanized citizen journalists-working together from their computer screens around the globe-to crack major cases, at a time when fact-based journalism is under assault from authoritarian forces. Founder Eliot Higgins introduces readers to the tools Bellingcat investigators use, tools available to anyone, from software that helps you pinpoint the location of an image, to an app that can nail down the time that photo was taken. This book digs deep into some of Bellingcat's most important investigations-the downing of flight MH17 over Ukraine, Assad's use of chemical weapons in Syria, the identities of alt-right protestors in Charlottesville-with the drama and gripping detail of a spy novel.
We have now begun our descent: How to Stop South Africa losing its way
Justice Malala - 2015
I am furious. Because I never thought it would happen to us. Not us, the rainbow nation that defied doomsayers and suckled and nurtured a fragile democracy into life for its children. I never thought it would happen to us, this relentless decline, the flirtation with a leap over the cliff.” In a searing, honest paean to his country, renowned political journalist and commentator Justice Malala forces South Africa to come face to face with the country it has become: corrupt, crime-ridden, compromised, its institutions captured by a selfish political elite bent on enriching itself at the expense of everyone else. In this deeply personal reflection, Malala’s diagnosis is devastating: South Africa is on the brink of ruin. He does not stop there. Malala believes that we have the wherewithal to turn things around: our lauded Constitution, the wealth of talent that exists, our history of activism and a democratic trajectory can all be used to stop the rot. But he has a warning: South Africans of all walks of life need to wake up and act, or else they will soon find their country has been stolen.
Faceless (A Suburban Noir Novel)
Cathryn Grant - 2015
Allie loves social media because it makes her feel close to her friends. It never occurs to her that some are jealous of the seemingly perfect lives they see displayed online. The embers of jealousy ignite when one of her friends flaunts his new-found wealth with a party to unveil his lavish home. A tragedy at the party seems to bring all of them closer together. But when one of Allie’s friends goes missing, their lives are suspended. No one knows whether they’re looking for an abductor or a killer. Will social media help them discover the truth? As the cords in Allie’s lifelong friendships start to fray, and her marriage is threatened by her addiction to social media, she discovers secrets she wishes she’d never known. You’ll love this gripping novel of envy and lust because you’ll recognize some of the characters from your own social media circle. Get a copy of this page-turning novel today.
Free Culture: The Nature and Future of Creativity
Lawrence Lessig - 2004
Never before have the cultural powers- that-be been able to exert such control over what we can and can't do with the culture around us. Our society defends free markets and free speech; why then does it permit such top-down control? To lose our long tradition of free culture, Lawrence Lessig shows us, is to lose our freedom to create, our freedom to build, and, ultimately, our freedom to imagine.
I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy
Lori Andrews - 2012
Social networks are the defining cultural movement of our time. Over a half a billion people are on Facebook alone. If Facebook were a country, it would be the third largest nation in the world. But while that nation appears to be a comforting small town in which we can share photos of friends and quaint bits of trivia about our lives, it is actually a lawless battle zone—a frontier with all the hidden and unpredictable dangers of any previously unexplored place. Social networks offer freedom. An ordinary individual can be a reporter, alerting the world to breaking news of a natural disaster or a political crisis. A layperson can be a scientist, participating in a crowd-sourced research project. Or an investigator, helping cops solve a crime. But as we work and chat and date (and sometimes even have sex) over the web, traditional rights may be slipping away. Colleges and employers routinely reject applicants because of information found on social networks. Cops use photos from people’s profiles to charge them with crimes—or argue for harsher sentences. Robbers use postings about vacations to figure out when to break into homes. At one school, officials used cameras on students’ laptops to spy on them in their bedrooms. The same power of information that can topple governments can also topple a person’s career, marriage, or future. What Andrews proposes is a Constitution for the web, to extend our rights to this wild new frontier. This vitally important book will generate a storm of attention.
The Internet Police: How Crime Went Online, and the Cops Followed
Nate Anderson - 2013
It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.
Who Controls the Internet?: Illusions of a Borderless World
Jack L. Goldsmith - 2006
It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them.While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance.Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Andy Greenberg - 2019
Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.
The Public Domain: Enclosing the Commons of the Mind
James Boyle - 2008
Boyle argues that just as every informed citizen needs to know at least something about the environment or civil rights, every citizen should also understand intellectual property law. Why? Because intellectual property rights mark out the ground rules of the information society, and today’s policies are unbalanced, unsupported by evidence, and often detrimental to cultural access, free speech, digital creativity, and scientific innovation.Boyle identifies as a major problem the widespread failure to understand the importance of the public domain—the realm of material that everyone is free to use and share without permission or fee. The public domain is as vital to innovation and culture as the realm of material protected by intellectual property rights, he asserts, and he calls for a movement akin to the environmental movement to preserve it. With a clear analysis of issues ranging from Jefferson’s philosophy of innovation to musical sampling, synthetic biology and Internet file sharing, this timely book brings a positive new perspective to important cultural and legal debates. If we continue to enclose the “commons of the mind,” Boyle argues, we will all be the poorer.
The Pirate's Dilemma: How Youth Culture Is Reinventing Capitalism
Matt Mason - 2007
Hip-hop, rave, graffiti, and gaming took it to another level, and now modern technology has made the ideas and innovations of youth culture increasingly intimate and increasingly global at the same time.In "The Pirate's Dilemma," "VICE" magazine's Matt Mason -- poised to become the Malcolm Gladwell of the iPod Generation -- brings the exuberance of a passionate music fan and the technological savvy of an IT wizard to the task of sorting through the changes brought about by the interface of pop culture and innovation. He charts the rise of various youth movements -- from pirate radio to remix culture -- and tracks their ripple effect throughout larger society. Mason brings a passion and a breadth of intelligence to questions such as the following: How did a male model who messed with disco records in the 1970s influence the way Boeing designs airplanes? Who was the nun who invented dance music, and how is her influence undermining capitalism as we know it? Did three high school kids who remixed Nazis into Smurfs in the 1980s change the future of the video game industry? Can hip-hop really bring about world peace? Each chapter crystallizes the idea behind one of these fringe movements and shows how it combined with technology to subvert old hierarchies and empower the individual.With great wit and insight -- and a cast of characters that includes such icons as the Ramones, Andy Warhol, Madonna, Russell Simmons, and 50 Cent -- Mason uncovers the trends that have transformed countercultural scenes into burgeoning global industries and movements, ultimately changing our way of life.
The Twenty-Six Words That Created the Internet
Jeff Kosseff - 2019
"This book examines the history and future of Section 230 of the Communications Decency Act, which provides websites extraordinary legal immunity for user-generated content and is responsible for the modern Internet in the United States"--
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier - 2015
Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.