Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth
Rachel Maddow - 2019
That same year, a trove of Michael Jackson memorabilia—including his iconic crystal-encrusted white glove—was sold at auction for over $1 million to a guy who was, officially, just the lowly forestry minister of the tiny nation of Equatorial Guinea. And in 2014, Ukrainian revolutionaries raided the palace of their ousted president and found a zoo of peacocks, gilded toilets, and a floating restaurant modeled after a Spanish galleon. Unlikely as it might seem, there is a thread connecting these events, and Rachel Maddow follows it to its crooked source: the unimaginably lucrative and equally corrupting oil and gas industry. With her trademark black humor, Maddow takes us on a switchback journey around the globe, revealing the greed and incompetence of Big Oil and Gas along the way, and drawing a surprising conclusion about why the Russian government hacked the 2016 U.S. election. She deftly shows how Russia’s rich reserves of crude have, paradoxically, stunted its growth, forcing Putin to maintain his power by spreading Russia’s rot into its rivals, its neighbors, the West’s most important alliances, and the United States. Chevron, BP, and a host of other industry players get their star turn, most notably ExxonMobil and the deceptively well-behaved Rex Tillerson. The oil and gas industry has weakened democracies in developed and developing countries, fouled oceans and rivers, and propped up authoritarian thieves and killers. But being outraged at it is, according to Maddow, “like being indignant when a lion takes down and eats a gazelle. You can’t really blame the lion. It’s in her nature.” Blowout is a call to contain the lion: to stop subsidizing the wealthiest businesses on earth, to fight for transparency, and to check the influence of the world’s most destructive industry and its enablers. The stakes have never been higher. As Maddow writes, “Democracy either wins this one or disappears.”
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
The Net Delusion: The Dark Side of Internet Freedom
Evgeny Morozov - 2010
Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire?In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder - not easier - to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy.Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of "Internet freedom" might have disastrous implications for the future of democracy as a whole.
Midnight in Chernobyl: The Untold Story of the World's Greatest Nuclear Disaster
Adam Higginbotham - 2019
The disaster not only changed the world’s perception of nuclear power and the science that spawned it, but also our understanding of the planet’s delicate ecology. With the images of the abandoned homes and playgrounds beyond the barbed wire of the 30-kilometer Exclusion Zone, the rusting graveyards of contaminated trucks and helicopters, the farmland lashed with black rain, the event fixed for all time the notion of radiation as an invisible killer.Chernobyl was also a key event in the destruction of the Soviet Union, and, with it, the United States’ victory in the Cold War. For Moscow, it was a political and financial catastrophe as much as an environmental and scientific one. With a total cost of 18 billion rubles—at the time equivalent to $18 billion—Chernobyl bankrupted an already teetering economy and revealed to its population a state built upon a pillar of lies. The full story of the events that started that night in the control room of Reactor No.4 of the V.I. Lenin Nuclear Power Plant has never been told—until now. Through two decades of reporting, new archival information, and firsthand interviews with witnesses, journalist Adam Higginbotham tells the full dramatic story, including Alexander Akimov and Anatoli Dyatlov, who represented the best and worst of Soviet life; denizens of a vanished world of secret policemen, internal passports, food lines, and heroic self-sacrifice for the Motherland. Midnight in Chernobyl, award-worthy nonfiction that reads like sci-fi, shows not only the final epic struggle of a dying empire but also the story of individual heroism and desperate, ingenious technical improvisation joining forces against a new kind of enemy.
iWar: War and Peace in the Information Age
Bill Gertz - 2017
Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
Playing to the Edge: American Intelligence in the Age of Terror
Michael V. Hayden - 2016
Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years? What was NSA before 9/11 and how did it change in its aftermath? Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? As Director of CIA in the last three years of the Bush administration, Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict. For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."
Kill All Normies: Online Culture Wars from 4chan and Tumblr to Trump and the Alt-Right
Angela Nagle - 2017
On one side the alt right ranges from the once obscure neo-reactionary and white separatist movements, to geeky subcultures like 4chan, to more mainstream manifestations such as the Trump-supporting gay libertarian Milo Yiannopolous. On the other side, a culture of struggle sessions and virtue signalling lurks behind a therapeutic language of trigger warnings and safe spaces. The feminist side of the online culture wars has its equally geeky subcultures right through to its mainstream expression. Kill All Normies explores some of the cultural genealogies and past parallels of these styles and subcultures, drawing from transgressive styles of 60s libertinism and conservative movements, to make the case for a rejection of the perpetual cultural turn.
@War: The Rise of the Military-Internet Complex
Shane Harris - 2014
In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier - 2015
Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
Winter Is Coming: Why Vladimir Putin and the Enemies of the Free World Must Be Stopped
Garry Kasparov - 2015
Yet in the intervening years —as America and the world’s other leading powers have continued to appease him — Putin has grown not only into a dictator but an international threat. With his vast resources and nuclear arsenal, Putin is at the center of a worldwide assault on political liberty and the modern world order.For Garry Kasparov, none of this is news. He has been a vocal critic of Putin for over a decade, even leading the pro-democracy opposition to him in the farcical 2008 presidential election. Yet years of seeing his Cassandra-like prophecies about Putin’s intentions fulfilled have left Kasparov with a darker truth: Putin’s Russia, like ISIS or Al Qaeda, defines itself in opposition to the free countries of the world.As Putin has grown ever more powerful, the threat he poses has grown from local to regional and finally to global. In this urgent book, Kasparov shows that the collapse of the Soviet Union was not an endpoint — only a change of seasons, as the Cold War melted into a new spring. But now, after years of complacency and poor judgment, winter is once again upon us.Argued with the force of Kasparov’s world-class intelligence, conviction, and hopes for his home country, Winter Is Coming reveals Putin for what he is: an existential danger hiding in plain sight.
The Less You Know, the Better You Sleep: Russia's Road to Terror and Dictatorship under Yeltsin and Putin
David Satter - 2016
Goulden, Washington Times “Satter . . . persuasively supplies evidence for his claim that a series of residential bombings in 1999 were part of an elaborate conspiracy orchestrated by Vladimir Putin, who used them as a smoke screen to invade Chechnya and catapult himself to the presidency.”—Publisher’s Weekly In December 2013, David Satter became the first American journalist to be expelled from Russia since the Cold War. The Moscow Times said it was not surprising he was expelled, “it was surprising it took so long.” Satter is known in Russia for having written that the apartment bombings in 1999, which were blamed on Chechens and brought Putin to power, were actually carried out by the Russian FSB security police. In this book, Satter tells the story of the apartment bombings and how Boris Yeltsin presided over the criminalization of Russia, why Vladimir Putin was chosen as his successor, and how Putin has suppressed all opposition while retaining the appearance of a pluralist state. As the threat represented by Russia becomes increasingly clear, Satter’s description of where Russia is and how it got there will be of vital interest to anyone concerned about the dangers facing the world today.
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
James Bamford - 2008
Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public.The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here.From the Trade Paperback edition.
Army of None: Autonomous Weapons and the Future of War
Paul Scharre - 2018
Today around the globe, at least thirty nations have weapons that can search for and destroy enemy targets all on their own. Paul Scharre, a leading expert in next-generation warfare, describes these and other high tech weapons systems—from Israel’s Harpy drone to the American submarine-hunting robot ship Sea Hunter—and examines the legal and ethical issues surrounding their use. “A smart primer to what’s to come in warfare” (Bruce Schneier), Army of None engages military history, global policy, and cutting-edge science to explore the implications of giving weapons the freedom to make life and death decisions. A former soldier himself, Scharre argues that we must embrace technology where it can make war more precise and humane, but when the choice is life or death, there is no replacement for the human heart.
IBM and the Holocaust
Edwin Black - 1999
As the 3rd Reich embarked upon its plan of conquest & genocide, IBM & its subsidiaries helped create enabling technologies, step-by-step, from the identification & cataloging programs of the 30s to the selections of the 40s. Only after Jews were identified--a massively complex task Hitler wanted done immediately--could they be targeted for efficient asset confiscation, ghettoization, deportation, enslaved labor & annihilation. It was a cross-tabulation & organizational challenge so monumental, it called for a computer. Of course, in the 30s no computer existed. But IBM's Hollerith punch card technology did exist. Aided by the company's custom-designed & constantly updated Hollerith systems, Hitler was able to automate the persecution of the Jews.Historians were amazed at the speed & accuracy with which the Nazis were able to identify & locate European Jewry. Until now, the pieces of this puzzle have never been fully assembled. The fact is, IBM technology was used to organize nearly everything in Germany & then Nazi Europe, from the identification of the Jews in censuses, registrations & ancestral tracing programs to the running of railroads & organizing of concentration camp slave labor. IBM & its German subsidiary custom-designed complex solutions, anticipating the Reich's needs. They didn't merely sell the machines & walk away. Instead, IBM leased these machines for high fees & became the sole source of the billions of punch cards needed. IBM & the Holocaust details the carefully crafted corporate collusion with the 3rd Reich, as well as the structured deniability of oral agreements, undated letters & the Geneva intermediaries--all undertaken as the newspapers blazed with accounts of persecution & destruction. Just as compelling is the human drama of one of our century's greatest minds, IBM founder Thomas Watson, who cooperated with the Nazis for the sake of profit. Only with IBM's technologic assistance was Hitler able to achieve the staggering numbers of the Holocaust. Edwin Black has now uncovered one of the last great mysteries of Germany's war against the Jews: how Hitler got the names.
Consent of the Networked: The Worldwide Struggle for Internet Freedom
Rebecca MacKinnon - 2012
For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries — many of them democracies — as well as mounting public concern over the vast quantities of information it collects about its users.In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace make decisions that affect our physical freedom — but without our consent. Yet the traditional solution to unaccountable corporate behavior — government regulation — cannot stop the abuse of digital power on its own, and sometimes even contributes to it.A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.