front cover of Cyberwars in the Middle East
Cyberwars in the Middle East
Ahmed Al-Rawi
Rutgers University Press, 2021
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other.

On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.
 
[more]

logo for Georgetown University Press
Fixing American Cybersecurity
Creating a Strategic Public-Private Partnership
Larry Clinton
Georgetown University Press, 2023

Advocates a cybersecurity “social contract” between government and business in seven key economic sectors

Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.

A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.

Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.

[more]

front cover of From Russia with Code
From Russia with Code
Programming Migrations in Post-Soviet Times
Mario Biagioli and Vincent Antonin Lepinay, editors
Duke University Press, 2019
While Russian computer scientists are notorious for their interference in the 2016 US presidential election, they are ubiquitous on Wall Street and coveted by international IT firms and often perceive themselves as the present manifestation of the past glory of Soviet scientific prowess. Drawing on over three hundred in-depth interviews, the contributors to From Russia with Code trace the practices, education, careers, networks, migrations, and lives of Russian IT professionals at home and abroad, showing how they function as key figures in the tense political and ideological environment of technological innovation in post-Soviet Russia. Among other topics, they analyze coders' creation of both transnational communities and local networks of political activists; Moscow's use of IT funding to control peripheral regions; brain drain and the experiences of coders living abroad in the United Kingdom, United States, Israel, and Finland; and the possible meanings of Russian computing systems in a heterogeneous nation and industry. Highlighting the centrality of computer scientists to post-Soviet economic mobilization in Russia, the contributors offer new insights into the difficulties through which a new entrepreneurial culture emerges in a rapidly changing world.

Contributors. Irina Antoschyuk, Mario Biagioli, Ksenia Ermoshina, Marina Fedorova, Andrey Indukaev, Alina Kontareva, Diana Kurkovsky, Vincent Lépinay, Alexandra Masalskaya, Daria Savchenko, Liubava Shatokhina, Alexandra Simonova, Ksenia Tatarchenko, Zinaida Vasilyeva, Dimitrii Zhikharevich
[more]

front cover of The Hacker and the State
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics
Ben Buchanan
Harvard University Press, 2020

“A must-read…It reveals important truths.”
—Vint Cerf, Internet pioneer

“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures

Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists.

Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph.

“A helpful reminder…of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.”
—Jonathan Freedland, New York Review of Books

“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.”
—General David Petraeus, former Director of the CIA

“Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’”
—Richard Harknett, former Scholar-in-Residence at United States Cyber Command

[more]

front cover of Hacking the Academy
Hacking the Academy
New Approaches to Scholarship and Teaching from Digital Humanities
Daniel J. Cohen and Tom Scheinfeldt, Editors
University of Michigan Press, 2013

On May 21, 2010, Daniel J. Cohen and Tom Scheinfeldt posted the following provocative questions online:

“Can an algorithm edit a journal? Can a library exist without books? Can students build and manage their own learning management platforms? Can a conference be held without a program? Can Twitter replace a scholarly society?”

As recently as the mid-2000s, questions like these would have been unthinkable. But today serious scholars are asking whether the institutions of the academy as they have existed for decades, even centuries, aren’t becoming obsolete. Every aspect of scholarly infrastructure is being questioned, and even more importantly, being hacked. Sympathetic scholars of traditionally disparate disciplines are canceling their association memberships and building their own networks on Facebook and Twitter. Journals are being compiled automatically from self-published blog posts. Newly minted PhDs are forgoing the tenure track for alternative academic careers that blur the lines between research, teaching, and service. Graduate students are looking beyond the categories of the traditional CV and building expansive professional identities and popular followings through social media. Educational technologists are “punking” established technology vendors by rolling out their own open source infrastructure.

Here, in Hacking the Academy, Daniel J. Cohen and Tom Scheinfeldt have gathered a sampling of the answers to their initial questions from scores of engaged academics who care deeply about higher education. These are the responses from a wide array of scholars, presenting their thoughts and approaches with a vibrant intensity, as they explore and contribute to ongoing efforts to rebuild scholarly infrastructure for a new millennium.

[more]

logo for Georgetown University Press
Hacking the Bomb
Cyber Threats and Nuclear Weapons
Andrew Futter
Georgetown University Press

Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter’s ground-breaking study of the cyber threat to nuclear weapons.

Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of “hacking the bomb.”

This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.

[more]

logo for Pluto Press
The Heretic's Guide to Global Finance
Hacking the Future of Money
Brett Scott
Pluto Press, 2013

Popular anger against the financial system has never been higher, yet the practical workings of the system remain opaque to many people. The Heretic's Guide to Global Finance aims to bridge the gap between protest slogans and practical proposals for reform.

Brett Scott is a campaigner and former derivatives broker who has a unique understanding of life inside and outside the financial sector. He builds up a framework for approaching it based on the three principles of 'Exploring', 'Jamming' and 'Building', offering a practical guide for those who wish to deepen their understanding of, and access to, the inner workings of financial institutions.

Scott covers aspects frequently overlooked, such as the cultural dimensions of the financial system, and considers major issues such as agricultural speculation, carbon markets and tar-sands financing. Crucially, it also showcases the growing alternative finance movement, showing how everyday people can get involved in building a new, democratic, financial system.

[more]


Send via email Share on Facebook Share on Twitter