Book picks similar to
Who Controls the Internet?: Illusions of a Borderless World by Jack L. Goldsmith
non-fiction
technology
internet
nonfiction
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
Cyberpunk: Outlaws and Hackers on the Computer Frontier
Katie Hafner - 1991
In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.
It's Complicated: The Social Lives of Networked Teens
Danah Boyd - 2014
. . It’s Complicated will update your mind.”—Alissa Quart, New York Times Book Review “A fascinating, well-researched and (mostly) reassuring look at how today's tech-savvy teenagers are using social media.”—People “The briefest possible summary? The kids are all right, but society isn’t.”—Andrew Leonard, Salon What is new about how teenagers communicate through services such as Facebook, Twitter, and Instagram? Do social media affect the quality of teens’ lives? In this eye-opening book, youth culture and technology expert danah boyd uncovers some of the major myths regarding teens' use of social media. She explores tropes about identity, privacy, safety, danger, and bullying. Ultimately, boyd argues that society fails young people when paternalism and protectionism hinder teenagers’ ability to become informed, thoughtful, and engaged citizens through their online interactions. Yet despite an environment of rampant fear-mongering, boyd finds that teens often find ways to engage and to develop a sense of identity. Boyd’s conclusions are essential reading not only for parents, teachers, and others who work with teens but also for anyone interested in the impact of emerging technologies on society, culture, and commerce in years to come. Offering insights gleaned from more than a decade of original fieldwork interviewing teenagers across the United States, boyd concludes reassuringly that the kids are all right. At the same time, she acknowledges that coming to terms with life in a networked era is not easy or obvious. In a technologically mediated world, life is bound to be complicated.
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick - 2001
Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism
Fred Turner - 2006
Bleak tools of the cold war, they embodied the rigid organization and mechanical conformity that made the military-industrial complex possible. But by the 1990s—and the dawn of the Internet—computers started to represent a very different kind of world: a collaborative and digital utopia modeled on the communal ideals of the hippies who so vehemently rebelled against the cold war establishment in the first place. From Counterculture to Cyberculture is the first book to explore this extraordinary and ironic transformation. Fred Turner here traces the previously untold story of a highly influential group of San Francisco Bay–area entrepreneurs: Stewart Brand and the Whole Earth network. Between 1968 and 1998, via such familiar venues as the National Book Award–winning Whole Earth Catalog, the computer conferencing system known as WELL, and, ultimately, the launch of the wildly successful Wired magazine, Brand and his colleagues brokered a long-running collaboration between San Francisco flower power and the emerging technological hub of Silicon Valley. Thanks to their vision, counterculturalists and technologists alike joined together to reimagine computers as tools for personal liberation, the building of virtual and decidedly alternative communities, and the exploration of bold new social frontiers. Shedding new light on how our networked culture came to be, this fascinating book reminds us that the distance between the Grateful Dead and Google, between Ken Kesey and the computer itself, is not as great as we might think.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
The Shallows: What the Internet Is Doing to Our Brains
Nicholas Carr - 2010
He also crystallized one of the most important debates of our time: As we enjoy the Net’s bounties, are we sacrificing our ability to read and think deeply?Now, Carr expands his argument into the most compelling exploration of the Internet’s intellectual and cultural consequences yet published. As he describes how human thought has been shaped through the centuries by “tools of the mind”—from the alphabet to maps, to the printing press, the clock, and the computer—Carr interweaves a fascinating account of recent discoveries in neuroscience by such pioneers as Michael Merzenich and Eric Kandel. Our brains, the historical and scientific evidence reveals, change in response to our experiences. The technologies we use to find, store, and share information can literally reroute our neural pathways.Building on the insights of thinkers from Plato to McLuhan, Carr makes a convincing case that every information technology carries an intellectual ethic—a set of assumptions about the nature of knowledge and intelligence. He explains how the printed book served to focus our attention, promoting deep and creative thought. In stark contrast, the Internet encourages the rapid, distracted sampling of small bits of information from many sources. Its ethic is that of the industrialist, an ethic of speed and efficiency, of optimized production and consumption—and now the Net is remaking us in its own image. We are becoming ever more adept at scanning and skimming, but what we are losing is our capacity for concentration, contemplation, and reflection.Part intellectual history, part popular science, and part cultural criticism, The Shallows sparkles with memorable vignettes—Friedrich Nietzsche wrestling with a typewriter, Sigmund Freud dissecting the brains of sea creatures, Nathaniel Hawthorne contemplating the thunderous approach of a steam locomotive—even as it plumbs profound questions about the state of our modern psyche. This is a book that will forever alter the way we think about media and our minds.
Smart Mobs: The Next Social Revolution
Howard Rheingold - 2002
The coming wave, says Rheingold, is the result of super-efficient mobile communications-cellular phones, personal digital assistants, and wireless-paging and Internet-access devices that will allow us to connect with anyone, anywhere, anytime. From the amusing ("Lovegetty" devices in Japan that light up when a person with the right date-potential characteristics appears in the vicinity) to the extraordinary (the overthrow of a repressive regime in the Philippines by political activists who mobilized by forwarding text messages via cell phones), Rheingold gives examples of the fundamentally new ways in which people are already engaging in group or collective action. He also considers the dark side of this phenomenon, such as the coordination of terrorist cells, threats to privacy, and the ability to incite violent behavior. Applying insights from sociology, artificial intelligence, engineering, and anthropology, Rheingold offers a penetrating perspective on the brave new convergence of pop culture, cutting-edge technology, and social activism. At the same time, he reminds us that, as with other technological revolutions, the real impact of mobile communications will come not from the technology itself but from how people use it, resist it, adapt to it, and ultimately use it to transform themselves, their communities, and their institutions.
Reality is Broken: Why Games Make Us Better and How They Can Change the World
Jane McGonigal - 2010
The average young person in the UK will spend 10,000 hours gaming by the age of twenty-one. What's causing this mass exodus? According to world-renowned game designer Jane McGonigal the answer is simple: videogames are fulfilling genuine human needs. Drawing on positive psychology, cognitive science and sociology, Reality is Broken shows how game designers have hit on core truths about what makes us happy, and utilized these discoveries to astonishing effect in virtual environments. But why, McGonigal asks, should we use the power of games for escapist entertainment alone? In this groundbreaking exploration of the power and future of gaming, she reveals how gamers have become expert problem solvers and collaborators, and shows how we can use the lessons of game design to socially positive ends, be it in our own lives, our communities or our businesses. Written for gamers and non-gamers alike, Reality is Broken sends a clear and provocative message: the future will belong to those who can understand, design and play games.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation
Andrew Marantz - 2019
For several years, Andrew Marantz, a New Yorker staff writer, has been embedded in two worlds. The first is the world of social-media entrepreneurs, who, acting out of naïvete and reckless ambition, upended all traditional means of receiving and transmitting information. The second is the world of the people he calls "the gate crashers"—the conspiracists, white supremacists, and nihilist trolls who have become experts at using social media to advance their corrosive agenda. Antisocial ranges broadly—from the first mass-printed books to the trending hashtags of the present; from secret gatherings of neo-Fascists to the White House press briefing room—and traces how the unthinkable becomes thinkable, and then how it becomes reality. Combining the keen narrative detail of Bill Buford's Among the Thugs and the sweep of George Packer's The Unwinding, Antisocial reveals how the boundaries between technology, media, and politics have been erased, resulting in a deeply broken informational landscape—the landscape in which we all now live. Marantz shows how alienated young people are led down the rabbit hole of online radicalization, and how fringe ideas spread—from anonymous corners of social media to cable TV to the President's Twitter feed. Marantz also sits with the creators of social media as they start to reckon with the forces they've unleashed. Will they be able to solve the communication crisis they helped bring about, or are their interventions too little too late?
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
John Sammons - 2011
This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.
Writing on the Wall: Social Media - The First 2,000 Years
Tom Standage - 2013
Indeed, as Tom Standage reveals in his scintillating new book, social media is anything but a new phenomenon.From the papyrus letters that Roman statesmen used to exchange news across the Empire to the advent of hand-printed tracts of the Reformation to the pamphlets that spread propaganda during the American and French revolutions, Standage chronicles the increasingly sophisticated ways people shared information with each other, spontaneously and organically, down the centuries. With the rise of newspapers in the nineteenth century, then radio and television, “mass media” consolidated control of information in the hands of a few moguls. However, the Internet has brought information sharing full circle, and the spreading of news along social networks has reemerged in powerful new ways.A fresh, provocative exploration of social media over two millennia, Writing on the Wall reminds us how modern behavior echoes that of prior centuries-the Catholic Church, for example, faced similar dilemmas in deciding whether or how to respond to Martin Luther's attacks in the early sixteenth century to those that large institutions confront today in responding to public criticism on the Internet. Invoking the likes of Thomas Paine and Vinton Cerf, co-inventor of the Internet, Standage explores themes that have long been debated: the tension between freedom of expression and censorship; whether social media trivializes, coarsens or enhances public discourse; and its role in spurring innovation, enabling self-promotion, and fomenting revolution. As engaging as it is visionary, Writing on the Wall draws on history to cast new light on today's social media and encourages debate and discussion about how we'll communicate in the future.
The Black Box Society: The Secret Algorithms That Control Money and Information
Frank Pasquale - 2014
The data compiled and portraits created are incredibly detailed, to the point of being invasive. But who connects the dots about what firms are doing with this information? The Black Box Society argues that we all need to be able to do so--and to set limits on how big data affects our lives.Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only scratched the surface of this troubling behavior.Frank Pasquale exposes how powerful interests abuse secrecy for profit and explains ways to rein them in. Demanding transparency is only the first step. An intelligible society would assure that key decisions of its most important firms are fair, nondiscriminatory, and open to criticism. Silicon Valley and Wall Street need to accept as much accountability as they impose on others.
Tools and Weapons: The Promise and the Peril of the Digital Age
Brad Smith - 2019
This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.