Deep Fakes and the Infocalypse: What You Urgently Need To Know


Nina Schick - 2020
    When combined with powerful voice AI, the results are utterly convincing.So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.

Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations


Thomas L. Friedman - 2016
    Friedman shows that we have entered an age of dizzying acceleration--and explains how to live in it. Due to an exponential increase in computing power, climbers atop Mount Everest enjoy excellent cell-phone service and self-driving cars are taking to the roads. A parallel explosion of economic interdependency has created new riches as well as spiraling debt burdens. Meanwhile, Mother Nature is also seeing dramatic changes as carbon levels rise and species go extinct, with compounding results.How do these changes interact, and how can we cope with them? To get a better purchase on the present, Friedman returns to his Minnesota childhood and sketches a world where politics worked and joining the middle class was an achievable goal. Today, by contrast, it is easier than ever to be a maker (try 3-D printing) or a breaker (the Islamic State excels at using Twitter), but harder than ever to be a leader or merely "average." Friedman concludes that nations and individuals must learn to be fast (innovative and quick to adapt), fair (prepared to help the casualties of change), and slow (adept at shutting out the noise and accessing their deepest values). With vision, authority, and wit, Thank You for Being Late establishes a blueprint for how to think about our times.

Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture


David Kushner - 2003
    Together, they ruled big business. They transformed popular culture. And they provoked a national controversy. More than anything, they lived a unique and rollicking American Dream, escaping the broken homes of their youth to produce the most notoriously successful game franchises in history—Doom and Quake— until the games they made tore them apart. This is a story of friendship and betrayal, commerce and artistry—a powerful and compassionate account of what it's like to be young, driven, and wildly creative.

MBS: The Rise to Power of Mohammed bin Salman


Ben Hubbard - 2020
    Since his father, King Salman, ascended to the throne in 2015, Mohammed bin Salman has leveraged his influence to restructure the kingdom’s economy, loosen its strict Islamic social codes, and confront its enemies around the region, especially Iran. That vision won him fans at home and on Wall Street, in Silicon Valley, in Hollywood, and at the White House, where President Trump embraced the prince as a key player in his own vision for the Middle East. But over time, the sheen of the visionary young reformer has become tarnished, leaving many struggling to determine whether MBS is in fact a rising dictator whose inexperience and rash decisions are destabilizing the world’s most volatile region. Based on years of reporting and hundreds of interviews, MBS reveals the machinations behind the kingdom’s catastrophic military intervention in Yemen, the bizarre detention of princes and businessmen in the Riyadh Ritz-Carlton, and the shifting Saudi relationships with Israel and the United States. And finally, it sheds new light on the greatest scandal of the young autocrat’s rise: the brutal killing of journalist Jamal Khashoggi by Saudi agents in Istanbul, a crime that shook Saudi Arabia’s relationship with Washington and left the world wondering whether MBS could get away with murder. MBS is a riveting, eye-opening account of how the young prince has wielded vast powers to reshape his kingdom and the world around him.

Data Feminism


Catherine D’Ignazio - 2020
    It has been used to expose injustice, improve health outcomes, and topple governments. But it has also been used to discriminate, police, and surveil. This potential for good, on the one hand, and harm, on the other, makes it essential to ask: Data science by whom? Data science for whom? Data science with whose interests in mind? The narratives around big data and data science are overwhelmingly white, male, and techno-heroic. In Data Feminism, Catherine D'Ignazio and Lauren Klein present a new way of thinking about data science and data ethics—one that is informed by intersectional feminist thought.Illustrating data feminism in action, D'Ignazio and Klein show how challenges to the male/female binary can help challenge other hierarchical (and empirically wrong) classification systems. They explain how, for example, an understanding of emotion can expand our ideas about effective data visualization, and how the concept of invisible labor can expose the significant human efforts required by our automated systems. And they show why the data never, ever “speak for themselves.”Data Feminism offers strategies for data scientists seeking to learn how feminism can help them work toward justice, and for feminists who want to focus their efforts on the growing field of data science. But Data Feminism is about much more than gender. It is about power, about who has it and who doesn't, and about how those differentials of power can be challenged and changed.

The Tyranny of Big Tech


Josh Hawley - 2021
    In The Tyranny of Big Tech, Senator Josh Hawley of Missouri argues that these mega-corporations - controlled by the robber barons of the modern era - are the gravest threat to American liberty in decades.To reverse course, Hawley argues, we must correct progressives’ mistakes of the past. That means recovering the link between liberty and democratic participation, building an economy that makes the working class strong, independent, and beholden to no one, and curbing the influence of corporate and political elites.Big Tech and its allies do not deal gently with those who cross them, and Senator Hawley proudly bears his own battle scars. But hubris is dangerous. The time is ripe to overcome the tyranny of Big Tech by reshaping the business and legal landscape of the digital world.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Hacker's Delight


Henry S. Warren Jr. - 2002
    Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.

Here Comes Everybody: The Power of Organizing Without Organizations


Clay Shirky - 2008
    'Here Comes Everybody' is an examination of how the spread of new forms of social interaction enabled by technology is changing the way humans form and exist within groups, with profound long-term economic and social effects, for good and for ill.

Prisoner's Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb


William Poundstone - 1992
    Though the answers may seem simple, their profound implications make the prisoner's dilemma one of the great unifying concepts of science. Watching players bluff in a poker game inspired John von Neumann--father of the modern computer and one of the sharpest minds of the century--to construct game theory, a mathematical study of conflict and deception. Game theory was readily embraced at the RAND Corporation, the archetypical think tank charged with formulating military strategy for the atomic age, and in 1950 two RAND scientists made a momentous discovery.Called the prisoner's dilemma, it is a disturbing and mind-bending game where two or more people may betray the common good for individual gain. Introduced shortly after the Soviet Union acquired the atomic bomb, the prisoner's dilemma quickly became a popular allegory of the nuclear arms race. Intellectuals such as von Neumann and Bertrand Russell joined military and political leaders in rallying to the preventive war movement, which advocated a nuclear first strike against the Soviet Union. Though the Truman administration rejected preventive war the United States entered into an arms race with the Soviets and game theory developed into a controversial tool of public policy--alternately accused of justifying arms races and touted as the only hope of preventing them.A masterful work of science writing, Prisoner's Dilemma weaves together a biography of the brilliant and tragic von Neumann, a history of pivotal phases of the cold war, and an investigation of game theory's far-reaching influence on public policy today. Most important, Prisoner's Dilemma is the incisive story of a revolutionary idea that has been hailed as a landmark of twentieth-century thought.

Who Can You Trust?: How Technology is Rewriting the Rules of Human Relationships


Rachel Botsman - 2017
    But this isn't the age of distrust--far from it. In this revolutionary book, world-renowned trust expert Rachel Botsman reveals that we are at the tipping point of one of the biggest social transformations in human history--with fundamental consequences for everyone. A new world order is emerging: we might have lost faith in institutions and leaders, but millions of people rent their home to total strangers, exchange digital currencies, or find themselves trusting a bot. This is the age of "distributed trust", a paradigm shift driven by innovative technologies that are rewriting the rules of an all-too-human relationship. If we are to benefit from this radical shift, we must understand the mechanics of how trust is built, managed, lost and repaired in the digital age. In the first book to explain this new world, Botsman provides a detailed map of this uncharted landscape--and explores what's next for humanity.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Being Digital


Nicholas Negroponte - 1995
    Negroponte's fans will want to get a copy of Being Digital, which is an edited version of the 18 articles he wrote for Wired about "being digital." Negroponte's text is mostly a history of media technology rather than a set of predictions for future technologies. In the beginning, he describes the evolution of CD-ROMs, multimedia, hypermedia, HDTV (high-definition television), and more. The section on interfaces is informative, offering an up-to-date history on visual interfaces, graphics, virtual reality (VR), holograms, teleconferencing hardware, the mouse and touch-sensitive interfaces, and speech recognition. In the last chapter and the epilogue, Negroponte offers visionary insight on what "being digital" means for our future. Negroponte praises computers for their educational value but recognizes certain dangers of technological advances, such as increased software and data piracy and huge shifts in our job market that will require workers to transfer their skills to the digital medium. Overall, Being Digital provides an informative history of the rise of technology and some interesting predictions for its future.

What Tech Calls Thinking: An Inquiry Into the Intellectual Bedrock of Silicon Valley


Adrian Daub - 2020
    Equally important to Silicon Valley's world-altering innovation are the language and ideas it uses to explain and justify itself. And often, those fancy new ideas are simply old motifs playing dress-up in a hoodie. From the myth of dropping out to the war cry of "disruption," Daub locates the Valley's supposedly original, radical thinking in the ideas of Heidegger and Ayn Rand, the New Age Esalen Foundation in Big Sur, and American traditions from the tent revival to predestination. Written with verve and imagination, What Tech Calls Thinking is an intellectual refutation of Silicon Valley's ethos, pulling back the curtain on the self-aggrandizing myths the Valley tells about itself.FSG Originals � Logic dissects the way technology functions in everyday lives. The titans of Silicon Valley, for all their utopian imaginings, never really had our best interests at heart: recent threats to democracy, truth, privacy, and safety, as a result of tech's reckless pursuit of progress, have shown as much. We present an alternate story, one that delights in capturing technology in all its contradictions and innovation, across borders and socioeconomic divisions, from history through the future, beyond platitudes and PR hype, and past doom and gloom. Our collaboration features four brief but provocative forays into the tech industry's many worlds, and aspires to incite fresh conversations about technology focused on nuanced and accessible explorations of the emerging tools that reorganize and redefine life today.

Free as in Freedom: Richard Stallman's Crusade for Free Software


Sam Williams - 2002
    It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success.Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. Like Alan Greenspan in the financial sector, Richard Stallman has assumed the role of tribal elder within the hacking community, a community that bills itself as anarchic and averse to central leadership or authority. How did this paradox come about? Free as in Freedom provides an answer. It also looks at how the latest twists and turns in the software marketplace have diminished Stallman's leadership role in some areas while augmenting it in others.Finally, Free as in Freedom examines both Stallman and the free software movement from historical viewpoint. Will future generations see Stallman as a genius or crackpot? The answer to that question depends partly on which side of the free software debate the reader currently stands and partly upon the reader's own outlook for the future. 100 years from now, when terms such as "computer," "operating system" and perhaps even "software" itself seem hopelessly quaint, will Richard Stallman's particular vision of freedom still resonate, or will it have taken its place alongside other utopian concepts on the 'ash-heap of history?'