Book picks similar to
Cyberwar: The Next Threat to National Security & What to Do About It by Richard A. Clarke
non-fiction
nonfiction
politics
cyber
Connectography: Mapping the Future of Global Civilization
Parag Khanna - 2016
Mankind is reengineering the planet, investing up to ten trillion dollars per year in transportation, energy, and communications infrastructure linking the world’s burgeoning megacities together. This has profound consequences for geopolitics, economics, demographics, the environment, and social identity. Connectivity, not geography, is our destiny. In Connectography, visionary strategist Parag Khanna travels from Ukraine to Iran, Mongolia to North Korea, Pakistan to Nigeria, and across the Arctic Circle and the South China Sea to explain the rapid and unprecedented changes affecting every part of the planet. He shows how militaries are deployed to protect supply chains as much as borders, and how nations are less at war over territory than engaged in tugs-of-war over pipelines, railways, shipping lanes, and Internet cables. The new arms race is to connect to the most markets—a race China is now winning, having launched a wave of infrastructure investments to unite Eurasia around its new Silk Roads. The United States can only regain ground by fusing with its neighbors into a super-continental North American Union of shared resources and prosperity.Connectography offers a unique and hopeful vision for the future. Khanna argues that new energy discoveries and technologies have eliminated the need for resource wars; ambitious transport corridors and power grids are unscrambling Africa’s fraught colonial borders; even the Arab world is evolving a more peaceful map as it builds resource and trade routes across its war-torn landscape. At the same time, thriving hubs such as Singapore and Dubai are injecting dynamism into young and heavily populated regions, cyber-communities empower commerce across vast distances, and the world’s ballooning financial assets are being wisely invested into building an inclusive global society. Beneath the chaos of a world that appears to be falling apart is a new foundation of connectivity pulling it together.Advance praise for Connectography“Connectography is ahead of the curve in seeing the battlefield of the future and the new kind of tug-of-war being waged on it. Khanna’s scholarship and foresight are world-class. . . . A must-read for the next president.”—Chuck Hagel, former U.S. secretary of defense “This bold reframing is an exciting addition to our ongoing debate about geopolitics and the future of globalization.”—Dominic Barton, global managing partner, McKinsey & Company “This is probably the most global book ever written. It is intensely specific while remaining broad and wide. Its takeaway is that infrastructure is destiny: Follow the supply lines outlined in this book to see where the future flows.”—Kevin Kelly, co-founder, Wired “There’s no better guide than Khanna to show us all the possibilities of this new hyperconnected world.”—Mathew Burrows, director, Strategic Foresight Initiative at the Atlantic Council, and former counselor, U.S. National Intelligence Council “This book is an invaluable resource for anyone involved in business, science, arts, or any other field.”—Mark Mobius, executive chairman, Templeton Emerging Markets Group “A must-read for anyone who wants to understand the future of humanity.”—Sandy Pentland, professor, MIT Media Lab
Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World
Don Tapscott - 2016
But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.
Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union
Stephen Budiansky - 2016
The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.
Alone Together: Why We Expect More from Technology and Less from Each Other
Sherry Turkle - 2011
Developing technology promises closeness. Sometimes it delivers, but much of our modern life leaves us less connected with people and more connected to simulations of them.In Alone Together, MIT technology and society professor Sherry Turkle explores the power of our new tools and toys to dramatically alter our social lives. It’s a nuanced exploration of what we are looking for—and sacrificing—in a world of electronic companions and social networking tools, and an argument that, despite the hand-waving of today’s self-described prophets of the future, it will be the next generation who will chart the path between isolation and connectivity.
The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies
Erik Brynjolfsson - 2014
Digital technologies—with hardware, software, and networks at their core—will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.In The Second Machine Age MIT’s Erik Brynjolfsson and Andrew McAfee—two thinkers at the forefront of their field—reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.Amid this bounty will also be wrenching change. Professions of all kinds—from lawyers to truck drivers—will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.A fundamentally optimistic book, The Second Machine Age alters how we think about issues of technological, societal, and economic progress.
The Scientist and the Spy: A True Story of China, the FBI, and Industrial Espionage
Mara Hvistendahl - 2020
government for trying to steal trade secrets, by a finalist for the Pulitzer Prize in nonfiction.In September 2011, sheriff's deputies in Iowa encountered three ethnic Chinese men near a field where a farmer was growing corn seed under contract with Monsanto. What began as a simple trespassing inquiry mushroomed into a two-year FBI operation in which investigators bugged the men's rental cars, used a warrant intended for foreign terrorists and spies, and flew surveillance planes over corn country--all in the name of protecting trade secrets of corporate giants Monsanto and DuPont Pioneer. In The Scientist and the Spy, Hvistendahl gives a gripping account of this unusually far-reaching investigation, which pitted a veteran FBI special agent against Florida resident Robert Mo, who after his academic career foundered took a questionable job with the Chinese agricultural company DBN--and became a pawn in a global rivalry.Industrial espionage by Chinese companies lies beneath the United States' recent trade war with China, and it is one of the top counterintelligence targets of the FBI. But a decade of efforts to stem the problem have been largely ineffective. Through previously unreleased FBI files and her reporting from across the United States and China, Hvistendahl describes a long history of shoddy counterintelligence on China, much of it tinged with racism, and questions the role that corporate influence plays in trade secrets theft cases brought by the U.S. government. The Scientist and the Spy is both an important exploration of the issues at stake and a compelling, involving read.
Turing's Cathedral: The Origins of the Digital Universe
George Dyson - 2012
In Turing’s Cathedral, George Dyson focuses on a small group of men and women, led by John von Neumann at the Institute for Advanced Study in Princeton, New Jersey, who built one of the first computers to realize Alan Turing’s vision of a Universal Machine. Their work would break the distinction between numbers that mean things and numbers that do things—and our universe would never be the same. Using five kilobytes of memory (the amount allocated to displaying the cursor on a computer desktop of today), they achieved unprecedented success in both weather prediction and nuclear weapons design, while tackling, in their spare time, problems ranging from the evolution of viruses to the evolution of stars. Dyson’s account, both historic and prophetic, sheds important new light on how the digital universe exploded in the aftermath of World War II. The proliferation of both codes and machines was paralleled by two historic developments: the decoding of self-replicating sequences in biology and the invention of the hydrogen bomb. It’s no coincidence that the most destructive and the most constructive of human inventions appeared at exactly the same time. How did code take over the world? In retracing how Alan Turing’s one-dimensional model became John von Neumann’s two-dimensional implementation, Turing’s Cathedral offers a series of provocative suggestions as to where the digital universe, now fully three-dimensional, may be heading next.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism
Jeremy Rifkin - 2014
(Marginal cost is the cost of producing additional units of a good or service, if fixed costs are not counted.) While economists have always welcomed a reduction in marginal cost, they never anticipated the possibility of a technological revolution that might bring marginal costs to near zero, making goods and services priceless, nearly free, and abundant, and no longer subject to market forces.Now, a formidable new technology infrastructure—the Internet of things (IoT)—is emerging with the potential of pushing large segments of economic life to near zero marginal cost in the years ahead. Rifkin describes how the Communication Internet is converging with a nascent Energy Internet and Logistics Internet to create a new technology platform that connects everything and everyone. Billions of sensors are being attached to natural resources, production lines, the electricity grid, logistics networks, recycling flows, and implanted in homes, offices, stores, vehicles, and even human beings, feeding Big Data into an IoT global neural network. Prosumers can connect to the network and use Big Data, analytics, and algorithms to accelerate efficiency, dramatically increase productivity, and lower the marginal cost of producing and sharing a wide range of products and services to near zero, just like they now do with information goods.The plummeting of marginal costs is spawning a hybrid economy—part capitalist market and part Collaborative Commons—with far reaching implications for society, according to Rifkin. Hundreds of millions of people are already transferring parts of their economic lives to the global Collaborative Commons. Prosumers are plugging into the fledgling IoT and making and sharing their own information, entertainment, green energy, and 3D-printed products at near zero marginal cost. They are also sharing cars, homes, clothes and other items via social media sites, rentals, redistribution clubs, and cooperatives at low or near zero marginal cost. Students are enrolling in free massive open online courses (MOOCs) that operate at near zero marginal cost. Social entrepreneurs are even bypassing the banking establishment and using crowdfunding to finance startup businesses as well as creating alternative currencies in the fledgling sharing economy. In this new world, social capital is as important as financial capital, access trumps ownership, sustainability supersedes consumerism, cooperation ousts competition, and "exchange value" in the capitalist marketplace is increasingly replaced by "sharable value" on the Collaborative Commons.Rifkin concludes that capitalism will remain with us, albeit in an increasingly streamlined role, primarily as an aggregator of network services and solutions, allowing it to flourish as a powerful niche player in the coming era. We are, however, says Rifkin, entering a world beyond markets where we are learning how to live together in an increasingly interdependent global Collaborative Commons.
This Is Not Propaganda: Adventures in the War Against Reality
Peter Pomerantsev - 2019
In this surreal atmosphere created to disorient us and undermine our sense of truth, we’ve lost not only our grip on peace and democracy — but our very notion of what those words even mean.Peter Pomerantsev takes us to the front lines of the disinformation age, where he meets Twitter revolutionaries and pop-up populists, “behavioral change” salesmen, Jihadi fanboys, Identitarians, truth cops, and many others. Forty years after his dissident parents were pursued by the KGB, Pomerantsev finds the Kremlin re-emerging as a great propaganda power. His research takes him back to Russia — but the answers he finds there are not what he expected.Blending reportage, family history, and intellectual adventure, This Is Not Propaganda explores how we can reimagine our politics and ourselves when reality seems to be coming apart.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Glock: The Rise of America's Gun
Paul M. Barrett - 2012
police departments, glamorized in countless Hollywood movies, and featured as a ubiquitous presence on prime-time TV. It has been rhapsodized by hip-hop artists, and coveted by cops and crooks alike. Created in 1982 by Gaston Glock, an obscure Austrian curtain-rod manufacturer, and swiftly adopted by the Austrian army, the Glock pistol, with its lightweight plastic frame and large-capacity spring-action magazine, arrived in America at a fortuitous time. Law enforcement agencies had concluded that their agents and officers, armed with standard six-round revolvers, were getting "outgunned" by drug dealers with semi-automatic pistols. They needed a new gun. When Karl Water, a firearm salesman based in the U.S. first saw a Glock in 1984, his reaction was, “Jeez, that’s ugly.” But the advantages of the pistol soon became apparent. The standard semi-automatic Glock could fire as many as 17 bullets from its magazine without reloading (one equipped with an extended thirty-three cartridge magazine was used in Tucson to shoot Gabrielle Giffords and 19 others). It was built with only 36 parts that were interchangeable with those of other models. You could drop it underwater, toss it from a helicopter, or leave it out in the snow, and it would still fire. It was reliable, accurate, lightweight, and cheaper to produce than Smith and Wesson’s revolver. Made in part of hardened plastic, it was even rumored (incorrectly) to be invisible to airport security screening. Filled with corporate intrigue, political maneuvering, Hollywood glitz, bloody shoot-outs—and an attempt on Gaston Glock’s life by a former lieutenant—Glock is at once the inside account of how Glock the company went about marketing its pistol to police agencies and later the public, as well as a compelling chronicle of the evolution of gun culture in America.
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
Robert B. Baer - 2002
This riveting book is both an indictment of an agency that lost its way and an unprecedented look at the roots of modern terrorism, and includes a new afterword in which Baer speaks out about the American war on terrorism and its profound implications throughout the Middle East.“Robert Baer was considered perhaps the best on-the-ground field officer in the Middle East.”–Seymour M. Hersh, The New YorkerFrom The PrefaceThis book is a memoir of one foot soldier’s career in the other cold war, the one against terrorist networks. It’s a story about places most Americans will never travel to, about people many Americans would prefer to think we don’t need to do business with.This memoir, I hope, will show the reader how spying is supposed to work, where the CIA lost its way, and how we can bring it back again. But I hope this book will accomplish one more purpose as well: I hope it will show why I am angry about what happened to the CIA. And I want to show why every American and everyone who cares about the preservation of this country should be angry and alarmed, too.The CIA was systematically destroyed by political correctness, by petty Beltway wars, by careerism, and much more. At a time when terrorist threats were compounding globally, the agency that should have been monitoring them was being scrubbed clean instead. Americans were making too much money to bother. Life was good. The White House and the National Security Council became cathedrals of commerce where the interests of big business outweighed the interests of protecting American citizens at home and abroad. Defanged and dispirited, the CIA went along for the ride. And then on September 11, 2001, the reckoning for such vast carelessness was presented for all the world to see.
How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy
Stephen Richard Witt - 2015
It’s about the greatest pirate in history, the most powerful executive in the music business, a revolutionary invention and an illegal website four times the size of the iTunes Music Store. Journalist Stephen Witt traces the secret history of digital music piracy, from the German audio engineers who invented the mp3, to a North Carolina compact-disc manufacturing plant where factory worker Dell Glover leaked nearly two thousand albums over the course of a decade, to the high-rises of midtown Manhattan where music executive Doug Morris cornered the global market on rap, and, finally, into the darkest recesses of the Internet.Through these interwoven narratives, Witt has written a thrilling book that depicts the moment in history when ordinary life became forever entwined with the world online — when, suddenly, all the music ever recorded was available for free. In the page-turning tradition of writers like Michael Lewis and Lawrence Wright, Witt’s deeply-reported first book introduces the unforgettable characters—inventors, executives, factory workers, and smugglers—who revolutionized an entire artform, and reveals for the first time the secret underworld of media pirates that transformed our digital lives.An irresistible never-before-told story of greed, cunning, genius, and deceit, How Music Got Free isn’t just a story of the music industry—it’s a must-read history of the Internet itself.
ISIS: Inside the Army of Terror
Michael Weiss - 2015
In ISIS: Inside the Army of Terror, American journalist Michael Weiss and Syrian analyst Hassan Hassan explain how these violent extremists evolved from a nearly defeated Iraqi insurgent group into a jihadi army of international volunteers who behead Western hostages in slickly produced videos and have conquered territory equal to the size of Great Britain. Beginning with the early days of Abu Musab al-Zarqawi, the founder of ISIS’s first incarnation as “al-Qaeda in Iraq,” Weiss and Hassan explain who the key players are—from their elusive leader Abu Bakr al-Baghdadi to the former Saddam Baathists in their ranks—where they come from, how the movement has attracted both local and global support, and where their financing comes from. Political and military maneuvering by the United States, Iraq, Iran, and Syria have all fueled ISIS’s astonishing and explosive expansion. Drawing on original interviews with former US military officials and current ISIS fighters, the authors also reveal the internecine struggles within the movement itself, as well as ISIS’s bloody hatred of Shiite Muslims, which is generating another sectarian war in the region. Just like the one the US thought it had stopped in 2011 in Iraq. Past is prologue and America’s legacy in the Middle East is sowing a new generation of terror.