Book picks similar to
The Cybersecurity Dilemma: Network Intrusions, Trust, and Fear in the International System by Ben Buchanan
cybersecurity
technology
nonfiction
non-fiction
Consent of the Networked: The Worldwide Struggle for Internet Freedom
Rebecca MacKinnon - 2012
For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries — many of them democracies — as well as mounting public concern over the vast quantities of information it collects about its users.In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace make decisions that affect our physical freedom — but without our consent. Yet the traditional solution to unaccountable corporate behavior — government regulation — cannot stop the abuse of digital power on its own, and sometimes even contributes to it.A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.
Understanding Power: The Indispensable Chomsky
Noam Chomsky - 2002
Noam Chomsky is universally accepted as one of the preeminent public intellectuals of the modern era. Over the past thirty years, broadly diverse audiences have gathered to attend his sold-out lectures. Now, in Understanding Power, Peter Mitchell and John Schoeffel have assembled the best of Chomsky's recent talks on the past, present, and future of the politics of power. In a series of enlightening and wide-ranging discussions, all published here for the first time, Chomsky radically reinterprets the events of the past three decades, covering topics from foreign policy during Vietnam to the decline of welfare under the Clinton administration. And as he elucidates the connection between America's imperialistic foreign policy and the decline of domestic social services, Chomsky also discerns the necessary steps to take toward social change. With an eye to political activism and the media's role in popular struggle, as well as U.S. foreign and domestic policy, Understanding Power offers a sweeping critique of the world around us and is definitive Chomsky. Characterized by Chomsky's accessible and informative style, this is the ideal book for those new to his work as well as for those who have been listening for years.
The Internet Police: How Crime Went Online, and the Cops Followed
Nate Anderson - 2013
It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.
The Future of Violence: Robots and Germs, Hackers and Drones: Confronting A New Age of Threat
Benjamin Wittes - 2014
government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies—from drones to computer networks and biological agents—which could be used to attack states and private citizens alike.In The Future of Violence, law and security experts Benjamin Wittes and Gabriella Blum detail the myriad possibilities, challenges, and enormous risks present in the modern world, and argue that if our national governments can no longer adequately protect us from harm, they will lose their legitimacy. Consequently, governments, companies, and citizens must rethink their security efforts to protect lives and liberty. In this brave new world where many little brothers are as menacing as any Big Brother, safeguarding our liberty and privacy may require strong domestic and international surveillance and regulatory controls. Maintaining security in this world where anyone can attack anyone requires a global perspective, with more multinational forces and greater action to protect (and protect against) weaker states who do not yet have the capability to police their own people. Drawing on political thinkers from Thomas Hobbes to the Founders and beyond, Wittes and Blum show that, despite recent protestations to the contrary, security and liberty are mutually supportive, and that we must embrace one to ensure the other. The Future of Violence is at once an introduction to our emerging world—one in which students can print guns with 3-D printers and scientists’ manipulations of viruses can be recreated and unleashed by ordinary people—and an authoritative blueprint for how government must adapt in order to survive and protect us.
Theories of International Politics and Zombies
Daniel W. Drezner - 2010
Addressing timely issues with analytical bite, Drezner looks at how well-known theories from international relations might be applied to a war with zombies. Exploring the plots of popular zombie films, songs, and books, Theories of International Politics and Zombies predicts realistic scenarios for the political stage in the face of a zombie threat and considers how valid--or how rotten--such scenarios might be.Drezner boldly lurches into the breach and stress tests the ways that different approaches to world politics would explain policy responses to the living dead. He examines the most prominent international relations theories--including realism, liberalism, constructivism, neoconservatism, and bureaucratic politics--and decomposes their predictions. He digs into prominent zombie films and novels, such as Night of the Living Dead and World War Z, to see where essential theories hold up and where they would stumble and fall. Drezner argues that by thinking about outside-of-the-box threats we get a cognitive grip on what former U.S. Secretary of Defense Donald Rumsfeld famously referred to as the unknown unknowns in international security.Correcting the zombie gap in international relations thinking and addressing the genuine but publicly unacknowledged fear of the dead rising from the grave, Theories of International Politics and Zombies presents political tactics and strategies accessible enough for any zombie to digest.
Perception and Misperception in International Politics
Robert Jervis - 1976
The New York Times called it, in an article published nearly ten years after the book's appearance, the seminal statement of principles underlying political psychology.The perspective established by Jervis remains an important counterpoint to structural explanations of international politics, and from it has developed a large literature on the psychology of leaders and the problems of decision making under conditions of incomplete information, stress, and cognitive bias.Jervis begins by describing the process of perception (for example, how decision makers learn from history) and then explores common forms of misperception (such as overestimating one's influence). Finally, he tests his ideas through a number of important events in international relations from nineteenth- and twentieth-century European history.In a contemporary application of Jervis's ideas, some argue that Saddam Hussein invaded Kuwait in 1990 in part because he misread the signals of American leaders with regard to the independence of Kuwait. Also, leaders of the United States and Iraq in the run-up to the most recent Gulf War might have been operating under cognitive biases that made them value certain kinds of information more than others, whether or not the information was true. Jervis proved that, once a leader believed something, that perception would influence the way the leader perceived all other relevant information.
The China Challenge: Shaping the Choices of a Rising Power
Thomas J. Christensen - 2015
leadership in Asia and beyond. Thomas J. Christensen argues against this zero-sum vision. Instead, he describes a new paradigm in which the real challenge lies in dissuading China from regional aggression while encouraging the country to contribute to the global order. Drawing on decades of scholarship and experience as a senior diplomat, Christensen offers a compelling new assessment of U.S.-China relations that is essential reading for anyone interested in the future of the globalized world.The China Challenge shows why China is nowhere near powerful enough to be considered a global “peer competitor” of the United States, but it is already strong enough to destabilize East Asia and to influence economic and political affairs worldwide. Despite China’s impressive achievements, the Chinese Communist Party faces enormous challenges. Christensen shows how nationalism and the threat of domestic instability influence the party’s decisions on issues like maritime sovereignty disputes, global financial management, control of the Internet, climate change, and policies toward Taiwan and Hong Kong.China benefits enormously from the current global order and has no intention of overthrowing it; but that is not enough. China’s active cooperation is essential to global governance. Never before has a developing country like China been asked to contribute so much to ensure international stability. If China obstructs international efforts to confront nuclear proliferation, civil conflicts, financial instability, and climate change, those efforts will falter, but even if China merely declines to support such efforts, the problems will grow vastly more complicated.Analyzing U.S.-China policy since the end of the Cold War, Christensen articulates a balanced strategic approach that explains why we should aim not to block China’s rise but rather to help shape its choices so as to deter regional aggression and encourage China’s active participation in international initiatives that benefit both nations.
The End of the Asian Century: War, Stagnation, and the Risks to the World’s Most Dynamic Region
Michael R. Auslin - 2017
. . Auslin argues that the conditions are building for major-power conflict in Asia and the Pacific."—David Frum,
Atlantic
Since Marco Polo, the West has waited for the “Asian Century.” Today, the world believes that Century has arrived. Yet from China’s slumping economy to war clouds over the South China Sea and from environmental devastation to demographic crisis, Asia’s future is increasingly uncertain. Historian and geopolitical expert Michael Auslin argues that far from being a cohesive powerhouse, Asia is a fractured region threatened by stagnation and instability. Here, he provides a comprehensive account of the economic, military, political, and demographic risks that bedevil half of our world, arguing that Asia, working with the United States, has a unique opportunity to avert catastrophe – but only if it acts boldly. Bringing together firsthand observations and decades of research, Auslin’s provocative reassessment of Asia’s future will be a must‑read for industry and investors, as well as politicians and scholars, for years to come.
CRACK99: The Takedown of a $100 Million Chinese Software Pirate
David Locke Hall - 2015
Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.
Battlegrounds: The Fight to Defend the Free World
H.R. McMaster - 2020
General H.R. McMaster, U.S. Army, ret., the former National Security Advisor and author of the bestselling classic Dereliction of Duty, comes a bold and provocative re-examination of the most critical foreign policy and national security challenges that face the United States, and an urgent call to compete to preserve America’s standing and security.Across multiple administrations since the end of the Cold War, American foreign policy has been misconceived, inconsistent, and poorly implemented. As a result, America and the free world have fallen behind rivals in power and influence. Meanwhile threats to security, freedom, and prosperity, such as nuclear proliferation and jihadist terrorism have grown. In BATTLEGROUNDS, H.R. McMaster describes efforts to reassess and fundamentally shift policies while he was National Security Advisor. And he provides a clear pathway forward to improve strategic competence and prevail in complex competitions against our adversaries.BATTLEGROUNDS is a groundbreaking reassessment of America’s place in the world, drawing from McMaster’s long engagement with these issues, including 34 years of service in the U.S. Army with multiple tours of duty in battlegrounds overseas and his 13 months as National Security Advisor in the Trump White House. It is also a powerful call for Americans and citizens of the free world to transcend the vitriol of partisan political discourse, better educate themselves about the most significant challenges to national and international security and work together to secure peace and prosperity for future generations.
The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries
Andrei Soldatov - 2015
Perhaps both. On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks. But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad -- such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia -- there is a radical or an opportunist who is using the web to chip away at the power of the state at home. Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard - 2016
In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
War by Other Means: Geoeconomics and Statecraft
Robert D. Blackwill - 2016
Policies governing everything from trade and investment to energy and exchange rates are wielded as tools to win diplomatic allies, punish adversaries, and coerce those in between. Not so in the United States, however. America still too often reaches for the gun over the purse to advance its interests abroad. The result is a playing field sharply tilting against the United States.In a cogent analysis of why the United States is losing ground as a world power and what it can do to reverse the trend, War by Other Means describes the statecraft of geoeconomics: the use of economic instruments to achieve geopolitical goals. Geoeconomics has long been a lever of America’s foreign policy. But factors ranging from U.S. bureaucratic politics to theories separating economics from foreign policy leave America ill prepared for this new era of geoeconomic contest, while rising powers, especially China, are adapting rapidly. The rules-based system Americans set in place after World War II benefited the United States for decades, but now, as the system frays and global competitors take advantage, America is uniquely self-constrained. Its geoeconomic policies are hampered by neglect and resistance, leaving the United States overly reliant on traditional military force.Drawing on immense scholarship and government experience, Robert Blackwill and Jennifer Harris show that if America’s policies are left uncorrected, the price in American blood and treasure will only grow. What geoeconomic warfare requires is a new vision of U.S. statecraft.
Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed
James C. Scott - 1998
Why do well-intentioned plans for improving the human condition go tragically awry?In this wide-ranging and original book, James C. Scott analyzes failed cases of large-scale authoritarian plans in a variety of fields. Centrally managed social plans misfire, Scott argues, when they impose schematic visions that do violence to complex interdependencies that are not—and cannot—be fully understood. Further, the success of designs for social organization depends upon the recognition that local, practical knowledge is as important as formal, epistemic knowledge. The author builds a persuasive case against "development theory" and imperialistic state planning that disregards the values, desires, and objections of its subjects. He identifies and discusses four conditions common to all planning disasters: administrative ordering of nature and society by the state; a "high-modernist ideology" that places confidence in the ability of science to improve every aspect of human life; a willingness to use authoritarian state power to effect large- scale interventions; and a prostrate civil society that cannot effectively resist such plans.