Book picks similar to
Cyberwar: The Next Threat to National Security & What to Do About It by Richard A. Clarke
non-fiction
nonfiction
politics
cyber
The Next 100 Years: A Forecast for the 21st Century
George Friedman - 2008
It imagines passing clouds to be permanent and is blind to powerful, long-term shifts taking place in full view of the world.” —George Friedman In his long-awaited and provocative new book, George Friedman turns his eye on the future—offering a lucid, highly readable forecast of the changes we can expect around the world during the twenty-first century. He explains where and why future wars will erupt (and how they will be fought), which nations will gain and lose economic and political power, and how new technologies and cultural trends will alter the way we live in the new century.The Next 100 Years draws on a fascinating exploration of history and geopolitical patterns dating back hundreds of years. Friedman shows that we are now, for the first time in half a millennium, at the dawn of a new era—with changes in store, including:• The U.S.-Jihadist war will conclude—replaced by a second full-blown cold war with Russia.• China will undergo a major extended internal crisis, and Mexico will emerge as an important world power.• A new global war will unfold toward the middle of the century between the United States and an unexpected coalition from Eastern Europe, Eurasia, and the Far East; but armies will be much smaller and wars will be less deadly.• Technology will focus on space—both for major military uses and for a dramatic new energy resource that will have radical environmental implications.• The United States will experience a Golden Age in the second half of the century.Written with the keen insight and thoughtful analysis that has made George Friedman a renowned expert in geopolitics and forecasting, The Next 100 Years presents a fascinating picture of what lies ahead.For continual, updated analysis and supplemental material, go to www.Stratfor.com
The Art of Intelligence
Henry A. Crumpton - 2012
In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.
The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Shoshana Zuboff - 2018
The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification."The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future.With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it.Table of contentsINTRODUCTION1. Home or exile in the digital futureI. THE FOUNDATIONS OF SURVEILLANCE CAPITALISM2. August 9, 2011: Setting the stage for Surveillance Capitalism3. The discovery of behavioral surplus4. The moat around the castle5. The elaboration of Surveillance Capitalism: Kidnap, corner, compete6. Hijacked: The division of learning in societyII. THE ADVANCE OF SURVEILLANCE CAPITALISM7. The reality business8. Rendition: From experience to data9. Rendition from the depths10. Make them dance11. The right to the future tenseIII. INSTRUMENTARIAN POWER FOR A THIRD MODERNITY12. Two species of power13. Big Other and the rise of instrumentarian power14. A utopia of certainty15, The instrumentarian collective16. Of life in the hive17. The right to sanctuaryCONCLUSION18. A coup from aboveAcknowledgementsAbout the authorDetailed table of contentsNotesIndex
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
Army of None: Autonomous Weapons and the Future of War
Paul Scharre - 2018
Today around the globe, at least thirty nations have weapons that can search for and destroy enemy targets all on their own. Paul Scharre, a leading expert in next-generation warfare, describes these and other high tech weapons systems—from Israel’s Harpy drone to the American submarine-hunting robot ship Sea Hunter—and examines the legal and ethical issues surrounding their use. “A smart primer to what’s to come in warfare” (Bruce Schneier), Army of None engages military history, global policy, and cutting-edge science to explore the implications of giving weapons the freedom to make life and death decisions. A former soldier himself, Scharre argues that we must embrace technology where it can make war more precise and humane, but when the choice is life or death, there is no replacement for the human heart.
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Cathy O'Neil - 2016
Increasingly, the decisions that affect our lives--where we go to school, whether we can get a job or a loan, how much we pay for health insurance--are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.But as mathematician and data scientist Cathy O'Neil reveals, the mathematical models being used today are unregulated and uncontestable, even when they're wrong. Most troubling, they reinforce discrimination--propping up the lucky, punishing the downtrodden, and undermining our democracy in the process.
The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States
National Commission on Terrorist Attacks Upon The United States - 2004
In Lower Manhattan, on a field in Pennsylvania, and along the banks of the Potomoc, the United States suffered the single largest loss of life from an enemy attack on its soil.In November 2002 the United States Congress and President George W. Bush established by law the National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission. This independent, bipartisan panel was directed to examine the facts and circumstances surrounding the September 11 attacks, identify lessons learned, and provide recommendations to safeguard against future acts of terrorism. This volume is the authorized edition of the Commission's final report. This volume is the authorized edition of the Commission's final report.
Blackwater: The Rise of the World's Most Powerful Mercenary Army
Jeremy Scahill - 2007
The shooting spree, labeled "Baghdad's Bloody Sunday," was neither the work of Iraqi insurgents nor U.S. soldiers. The shooters were private forces working for the secretive mercenary company, Blackwater Worldwide. This is the explosive story of a company that rose a decade ago from Moyock, North Carolina, to become one of the most powerful players in the "War on Terror." In his gripping bestseller, award-winning journalist Jeremy Scahill takes us from the bloodied streets of Iraq to hurricane-ravaged New Orleans to the chambers of power in Washington, to expose Blackwater as the frightening new face of the U.S. war machine.
Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan
Steve Coll - 2018
While the US was trying to quell extremists, a highly secretive and compartmentalized wing of I.S.I., known as "Directorate S," was covertly training, arming, and seeking to legitimize the Taliban, in order to enlarge Pakistan's sphere of influence. After 9/11, when fifty-nine countries, led by the U. S., deployed troops or provided aid to Afghanistan in an effort to flush out the Taliban and Al Qaeda, the U.S. was set on an invisible slow-motion collision course with Pakistan.Today we know that the war in Afghanistan would falter badly because of military hubris at the highest levels of the Pentagon, the drain on resources and provocation in the Muslim world caused by the U.S.-led invasion of Iraq, and corruption. But more than anything, as Coll makes painfully clear, the war in Afghanistan was doomed because of the failure of the United States to apprehend the motivations and intentions of I.S.I.'s "Directorate S". This was a swirling and shadowy struggle of historic proportions, which endured over a decade and across both the Bush and Obama administrations, involving multiple secret intelligence agencies, a litany of incongruous strategies and tactics, and dozens of players, including some of the most prominent military and political figures. A sprawling American tragedy, the war was an open clash of arms but also a covert melee of ideas, secrets, and subterranean violence. Coll excavates this grand battle, which took place away from the gaze of the American public. With unsurpassed expertise, original research, and attention to detail, he brings to life a narrative at once vast and intricate, local and global, propulsive and painstaking. This is the definitive explanation of how America came to be so badly ensnared in an elaborate, factional, and seemingly interminable conflict in South Asia. Nothing less than a forensic examination of the personal and political forces that shape world history, Directorate S is a complete masterpiece of both investigative and narrative journalism.
The Future of the Internet and How to Stop It
Jonathan L. Zittrain - 2008
With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download
Legacy of Ashes: The History of the CIA
Tim Weiner - 2007
Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.
The World Is Flat: A Brief History of the Twenty-first Century
Thomas L. Friedman - 2005
With his inimitable ability to translate complex foreign policy and economic issues, Friedman explains how the flattening of the world happened at the dawn of the 21st century; what it means to countries, companies, communities and individuals; and how governments and societies can, and must, adapt.
Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy
George Gilder - 2018
Gilder says or writes is ever delivered at anything less than the fullest philosophical decibel... Mr. Gilder sounds less like a tech guru than a poet, and his words tumble out in a romantic cascade." “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.” — Peter Thiel, founder of PayPal and Palantir Technologies and author of Zero to One: Notes on Startups, or How to Build the Future The Age of Google, built on big data and machine intelligence, has been an awesome era. But it’s coming to an end. In Life after Google, George Gilder—the peerless visionary of technology and culture—explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns. Google’s astonishing ability to “search and sort” attracts the entire world to its search engine and countless other goodies—videos, maps, email, calendars….And everything it offers is free, or so it seems. Instead of paying directly, users submit to advertising. The system of “aggregate and advertise” works—for a while—if you control an empire of data centers, but a market without prices strangles entrepreneurship and turns the Internet into a wasteland of ads. The crisis is not just economic. Even as advances in artificial intelligence induce delusions of omnipotence and transcendence, Silicon Valley has pretty much given up on security. The Internet firewalls supposedly protecting all those passwords and personal information have proved hopelessly permeable. The crisis cannot be solved within the current computer and network architecture. The future lies with the “cryptocosm”—the new architecture of the blockchain and its derivatives. Enabling cryptocurrencies such as bitcoin and ether, NEO and Hashgraph, it will provide the Internet a secure global payments system, ending the aggregate-and-advertise Age of Google. Silicon Valley, long dominated by a few giants, faces a “great unbundling,” which will disperse computer power and commerce and transform the economy and the Internet. Life after Google is almost here. For fans of "Wealth and Poverty," "Knowledge and Power," and "The Scandal of Money."
Cyber War Will Not Take Place
Thomas Rid - 2013
In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?
Free Culture: The Nature and Future of Creativity
Lawrence Lessig - 2004
Never before have the cultural powers- that-be been able to exert such control over what we can and can't do with the culture around us. Our society defends free markets and free speech; why then does it permit such top-down control? To lose our long tradition of free culture, Lawrence Lessig shows us, is to lose our freedom to create, our freedom to build, and, ultimately, our freedom to imagine.