front cover of
David K. Johnson
University of Chicago Press
The McCarthy era is generally considered the worst period of political repression in recent American history. But while the famous question, "Are you now or have you ever been a member of the Communist Party?" resonated in the halls of Congress, security officials were posing another question at least as frequently, if more discreetly: "Information has come to the attention of the Civil Service Commission that you are a homosexual. What comment do you care to make?"

Historian David K. Johnson here relates the frightening, untold story of how, during the Cold War, homosexuals were considered as dangerous a threat to national security as Communists. Charges that the Roosevelt and Truman administrations were havens for homosexuals proved a potent political weapon, sparking a "Lavender Scare" more vehement and long-lasting than McCarthy's Red Scare. Relying on newly declassified documents, years of research in the records of the National Archives and the FBI, and interviews with former civil servants, Johnson recreates the vibrant gay subculture that flourished in New Deal-era Washington and takes us inside the security interrogation rooms where thousands of Americans were questioned about their sex lives. The homosexual purges ended promising careers, ruined lives, and pushed many to suicide. But, as Johnson also shows, the purges brought victims together to protest their treatment, helping launch a new civil rights struggle.

The Lavender Scare shatters the myth that homosexuality has only recently become a national political issue, changing the way we think about both the McCarthy era and the origins of the gay rights movement. And perhaps just as importantly, this book is a cautionary tale, reminding us of how acts taken by the government in the name of "national security" during the Cold War resulted in the infringement of the civil liberties of thousands of Americans.
[more]

logo for American Library Association
Anonymity
Alison Macrina
American Library Association, 2019

front cover of Authentication Technologies for Cloud Computing, IoT and Big Data
Authentication Technologies for Cloud Computing, IoT and Big Data
Yasser M. Alginahi
The Institution of Engineering and Technology, 2019
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
[more]

logo for Pluto Press
Biohackers
The Politics of Open Science
Alessandro Delfanti
Pluto Press, 2013

Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information. Alessandro Delfanti argues that the combination of the ethos of 20th century science, the hacker movement and the free software movement is producing an open science culture which redefines the relationship between researchers, scientific institutions and commercial companies.

Biohackers looks at the emergence of the citizen biology community ‘DIYbio’, the shift to open access by the American biologist Craig Venter and the rebellion of the Italian virologist Ilaria Capua against WHO data-sharing policies.

Delfanti argues that these biologists and many others are involved in a transformation of both life sciences and information systems, using open access tools and claiming independence from both academic and corporate institutions.

[more]

logo for American Library Association
The Black Belt Librarian
Real-World Safety & Security
Warren Graham
American Library Association, 2011

front cover of Business Confronts Terrorism
Business Confronts Terrorism
Risks and Responses
Dean C. Alexander
University of Wisconsin Press, 2004
    Central banks and stock exchanges are bombed. Suicide bombers ravage cinemas, nightclubs, and theaters. Planes crash into skyscrapers and government buildings. Multiple bombs explode on commuter trains. Thousands of people are killed and injured while millions are terrorized by these attacks.
    These scenarios could be part of a future Hollywood movie. Sadly, they are representative of previous terror attacks against industry and government interests worldwide. Moreover, they are harbingers of global terror threats.
    Industry constitutes a prime target of contemporary terrorism. This timely book analyzes the threats companies face due to terrorism, industry responses to these dangers, and terrorism’s effects on conducting business in the post-9/11 environment. Dean C. Alexander details the conventional and unconventional terror capabilities facing industry. He describes the activities of terrorists in the economic system and the ways they finance their operations.
    Alexander discusses how companies can reduce terrorist threats and that corporate security can minimize political violence. He outlines the dynamics of the public-private partnership against terrorism: government aiding industry, business supporting government, and tensions between the two. He also delineates terrorism’s effects—financial, physical, and emotional—on workers and employers. He highlights the negative financial and economic consequences of terrorism. He discusses the impact of terrorism on traditional business practices and concludes with an assessment of future trends.
[more]

logo for The Institution of Engineering and Technology
Code of Practice for Cyber Security in the Built Environment
The Institution of Engineering and Technology
The Institution of Engineering and Technology, 2014
This Code of Practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment.
[more]

front cover of Cyber Blockades
Cyber Blockades
Alison Lawlor Russell
Georgetown University Press, 2014

Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare.

The author defines and explains the emerging concept of “cyber blockades” and presents a unique comparison of blockade operations in five different domains—on land, at sea, in the air, in space, and in cyberspace—identifying common elements as well as important distinctions. Alison Lawlor Russell’s framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War.

Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare.

[more]

logo for The Institution of Engineering and Technology
Cybersecurity in Transport Systems
Martin Hawley
The Institution of Engineering and Technology, 2022
The role of data and information and communication technology (ICT) is growing in all areas of transport, with autonomous vehicles among the most advanced examples. This opens up opportunities for malevolent interference, such as remote-control of vehicles for criminal or terrorist purposes or interruption of increasingly interconnected transport systems. It is therefore imperative that cybersecurity is upgraded and designed into new systems.
[more]

logo for American Library Association
Dealing with Difficult People in the Library
American Library Association
American Library Association, 1999

front cover of The Defender’s Dilemma
The Defender’s Dilemma
Charting a Course Toward Cybersecurity
Martin C. Libicki
RAND Corporation, 2015
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
[more]

logo for Harvard University Press
Defensive Positions
The Politics of Maritime Security in Tokugawa Japan
Noell Wilson
Harvard University Press
Defensive Positions focuses on the role of regional domains in early modern Japan’s coastal defense, shedding new light on this system’s development. This examination, in turn, has significant long-term political implications for the involvement of those domains in Tokugawa state formation. Noell Wilson argues that domainal autonomy in executing maritime defense slowly escalated over the course of the Tokugawa period to the point where the daimyo ultimately challenged Tokugawa authorities as the primary military interface with the outside world. By first exploring localized maritime defense at Nagasaki and then comparing its organization with those of the Yokohama and Hakodate harbors during the treaty port era, Wilson identifies new, core systemic sources for the collapse of the shogunate’s control of the monopoly on violence. Her insightful analysis reveals how the previously unexamined system of domain-managed coastal defense comprised a critical third element—in addition to trade and diplomacy—of Tokugawa external relations. Domainal control of coastal defense exacerbated the shogunate’s inability to respond to important military and political challenges as Japan transitioned from an early modern system of parcelized, local maritime defense to one of centralized, national security as embraced by world powers in the nineteenth century.
[more]

front cover of The Disaster Planning Handbook for Libraries
The Disaster Planning Handbook for Libraries
Mary Grace Flaherty
American Library Association, 2021
Libraries are in a unique position to aid communities during times of adversity, and this comprehensive handbook’s practical tools and expert guidance will help ensure that your library is thoroughly prepared for emergency response and recovery.

Your library is a vital information hub and resource provider every single day, and that’s doubly true when calamity strikes. In fact, your library’s role as an “essential community function” during disasters is now encoded in U.S. law. Engaging as a partner in planning and preparedness will build much-needed community support should disaster strike, and even a basic plan will also save you time and stress later on. No matter where your library is in the disaster planning cycle, this handbook will make the process clearer and less daunting. You’ll get tools, activities, easy-to-adapt templates, and hands-on guidance on such topics as

  • the six phases of disaster response;
  • 15 first-hand accounts of library disaster planning or responses, helping you identify the library services most needed during a disaster;
  • three essential factors that will shape the form of your disaster plan;
  • preparing for hurricanes, tornadoes, fires, floods, and earthquakes;
  • ideas for connecting with your community’s emergency response teams; 
  • federal government planning resources;
  • pointers on working with state and local governments;
  • a sample Memorandum of Understanding to outline mutual support for a speedier recovery;
  • recommended courses and training, many of which are free;
  • targeted advice for archives and special collections;
  • sample building inspection checklists; and
  • recommended games to help children and families prepare.
[more]

logo for Georgetown University Press
Fixing American Cybersecurity
Creating a Strategic Public-Private Partnership
Larry Clinton
Georgetown University Press, 2023

Advocates a cybersecurity “social contract” between government and business in seven key economic sectors

Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.

A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.

Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.

[more]

logo for Assoc of College & Research Libraries
Guide to Security Considerations and Practices for Rare Book, Manuscript, and Special Collection Libraries
Everett Wilkie, Jr
Assoc of College & Research Libraries, 2011

front cover of Hackers Wanted
Hackers Wanted
An Examination of the Cybersecurity Labor Market
Martin C. Libicki
RAND Corporation, 2014
The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
[more]

logo for Georgetown University Press
Hacking the Bomb
Cyber Threats and Nuclear Weapons
Andrew Futter
Georgetown University Press

Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter’s ground-breaking study of the cyber threat to nuclear weapons.

Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of “hacking the bomb.”

This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.

[more]

front cover of Internet and Wireless Security
Internet and Wireless Security
Robert Temple
The Institution of Engineering and Technology, 2002
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
[more]

front cover of The Lavender Scare
The Lavender Scare
The Cold War Persecution of Gays and Lesbians in the Federal Government
David K. Johnson
University of Chicago Press, 2023
A new edition of a classic work of history, revealing the anti-homosexual purges of midcentury Washington.

In The Lavender Scare, David K. Johnson tells the frightening story of how, during the Cold War, homosexuals were considered as dangerous a threat to national security as Communists. Charges that the Roosevelt and Truman administrations were havens for homosexuals proved a potent political weapon, sparking a “Lavender Scare” more vehement and long-lasting than Joseph McCarthy’s Red Scare. Drawing on declassified documents, years of research in the records of the National Archives and the FBI, and interviews with former civil servants, Johnson recreates the vibrant gay subculture that flourished in midcentury Washington and takes us inside the security interrogation rooms where anti-homosexual purges ruined the lives and careers of thousands of Americans. This enlarged edition of Johnson’s classic work of history—the winner of numerous awards and the basis for an acclaimed documentary broadcast on PBS—features a new epilogue, bringing the still-relevant story into the twenty-first century.
[more]

logo for American Library Association
The Library Security and Safety Guide to Prevention, Planning, and Response
Miriam B. Kahn
American Library Association, 2008

logo for American Library Association
Library Security
Better Communication, Safer Facilities
Steve Albrecht
American Library Association, 2015

logo for American Library Association
Library’s Crisis Communications Planner
A PR Guide for Handling Every Emergency
Jan Thenell
American Library Association, 2004

front cover of Nuclear Authority
Nuclear Authority
The IAEA and the Absolute Weapon
Robert L. Brown
Georgetown University Press, 2015

Once dismissed as ineffectual, the International Atomic Energy Agency (IAEA) has in the past twenty years emerged as a powerful international organization. Member states allow the IAEA to render judgment on matters vital to peace and security while nations around the globe comply with its rules and commands on proliferation, safety, and a range of other issues.

Robert L. Brown details the IAEA’s role in facilitating both control of nuclear weapons and the safe exploitation of nuclear power. As he shows, the IAEA has acquired a surprising amount of power as states, for political and technological reasons, turn to it to supply policy cooperation and to act as an agent for their security and safety. The agency’s success in gaining and holding authority rests in part on its ability to apply politically neutral expertise that produces beneficial policy outcomes. But Brown also delves into the puzzle of how an agency created by states to aid cooperation has acquired power over them.

[more]

front cover of Olympic-Caliber Cybersecurity
Olympic-Caliber Cybersecurity
Lessons for Safeguarding the 2020 Games and Other Major Events
Cynthia Dion-Schwarz
RAND Corporation, 2018
Understanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.
[more]

front cover of The Other Quiet Professionals
The Other Quiet Professionals
Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
[more]

front cover of Politics at the Airport
Politics at the Airport
Mark B. Salter
University of Minnesota Press, 2008

front cover of Punishing Schools
Punishing Schools
Fear and Citizenship in American Public Education
William Lyons and Julie Drew
University of Michigan Press, 2006

In a society increasingly dominated by zero-tolerance thinking, Punishing Schools argues that our educational system has become both the subject of legislative punishment and an instrument for the punishment of children. William Lyons and Julie Drew analyze the connections between state sanctions against our schools (the diversion of funding to charter schools, imposition of unfunded mandates, and enforcement of dubious forms of teacher accountability) and the schools' own infliction of punitive measures on their students-a vicious cycle that creates fear and encourages the development of passive and dependent citizens.

"Public schools in the United States are no longer viewed as a public good. On the contrary, they are increasingly modeled after prisons, and students similarly have come to mirror the suspicions and fears attributed to prisoners. Punishing Schools is one of the most insightful, thoughtful, and liberating books I have read on what it means to understand, critically engage, and transform the present status and state of schools from objects of fear and disdain to institutions that value young people, teachers, and administrators as part of a broader vision of social justice, freedom, and equality. William Lyons and Julie Drew have done their homework and provide all the necessary elements for understanding and defending schools as public spheres that are foundational to a democracy. This book should be required reading for every student, teacher, parent, and concerned citizen in the United States. In the end, this book is not just about saving schools, it is also about saving democracy and offering young people a future that matters."
--Henry Giroux, McMaster University

"This is an important book . . . a distinctive contribution. The authors move back and forth convincingly between the micropolitics of school discipline and the 'politics writ large' of the liberal left and the utopian right. The result is an expansive, idealistic, and well-grounded book in the spirit of the very best of social control literature."
--Stuart Scheingold, Professor Emeritus, Political Science, University of Washington


William Lyons is Director of Center for Conflict Management and Associate Professor of Political Science, University of Akron.

Julie Drew is Associate Professor of English, University of Akron.

[more]

front cover of Schools Under Surveillance
Schools Under Surveillance
Cultures of Control in Public Education
Monahan, Torin
Rutgers University Press, 2009
Schools under Surveillance gathers together some of the very best researchers studying surveillance and discipline in contemporary public schools. Surveillance is not simply about monitoring or tracking individuals and their dataùit is about the structuring of power relations through human, technical, or hybrid control mechanisms. Essays cover a broad range of topics including police and military recruiters on campus, testing and accountability regimes such as No Child Left Behind, and efforts by students and teachers to circumvent the most egregious forms of surveillance in public education. Each contributor is committed to the continued critique of the disparity and inequality in the use of surveillance to target and sort students along lines of race, class, and gender.
[more]

logo for American Library Association
Securing Library Technology
American Library Association
American Library Association, 2009

front cover of Security. Cooperation. Governance.
Security. Cooperation. Governance.
The Canada-United States Open Border Paradox
Christian Leuprecht and Todd Hataley, Editors
University of Michigan Press, 2023
Historically, national borders have evolved in ways that serve the interests of central states in security and the regulation of trade. This volume explores Canada–US border and security policies that have evolved from successive trade agreements since the 1950s, punctuated by new and emerging challenges to security in the twenty-first century. The sectoral and geographical diversity of cross-border interdependence of what remains the world’s largest bilateral trade relationship makes the Canada–US border a living laboratory for studying the interaction of trade, security, and other border policies that challenge traditional centralized approaches to national security.

The book’s findings show that border governance straddles multiple regional, sectoral, and security scales in ways rarely documented in such detail. These developments have precipitated an Open Border Paradox: extensive, regionally varied flows of trade and people have resulted in a series of nested but interdependent security regimes that function on different scales and vary across economic and policy sectors. These realities have given rise to regional and sectoral specialization in related security regimes. For instance, just-in-time automotive production in the Great Lakes region varies considerably from the governance of maritime and intermodal trade (and port systems) on the Atlantic and Pacific coasts, which in turn is quite different from commodity-based systems that manage diverse agricultural and food trade in the Canadian Prairies and US Great Plains.
 
The paradox of open borders and their legitimacy is a function of robust bilateral and multilevel governance based on effective partnerships with substate governments and the private sector. Effective policy accounts for regional variation in integrated binational security and trade imperatives. At the same time, binational and continental policies are embedded in each country’s trade and security relationships beyond North America.
[more]

logo for American Library Association
Technology Disaster Response and Recovery Planning
A LITA Guide
Mary Mallery
American Library Association, 2015

front cover of The Transparent Traveler
The Transparent Traveler
The Performance and Culture of Airport Security
Rachel Hall
Duke University Press, 2015
At the airport we line up, remove our shoes, empty our pockets, and hold still for three seconds in the body scanner. Deemed safe, we put ourselves back together and are free to buy the beverage we were prohibited from taking through security. In The Transparent Traveler Rachel Hall explains how the familiar routines of airport security choreograph passenger behavior to create submissive and docile travelers. The cultural performance of contemporary security practices mobilizes what Hall calls the "aesthetics of transparency." To appear transparent, a passenger must perform innocence and display a willingness to open their body to routine inspection and analysis. Those who cannot—whether because of race, immigration and citizenship status, disability, age, or religion—are deemed opaque, presumed to be a threat, and subject to search and detention. Analyzing everything from airport architecture, photography, and computer-generated imagery to full-body scanners and TSA behavior detection techniques, Hall theorizes the transparent traveler as the embodiment of a cultural ideal of submission to surveillance. 
 
[more]

front cover of Trusted Communications with Physical Layer Security for 5G and Beyond
Trusted Communications with Physical Layer Security for 5G and Beyond
Trung Q. Duong
The Institution of Engineering and Technology, 2017
Physical layer security is emerging as a promising means of ensuring secrecy in wireless communications. The key idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from the source to the intended receiver while keeping this message confidential from eavesdroppers.
[more]

front cover of Trusted Computing
Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
[more]

front cover of Trusted Platform Modules
Trusted Platform Modules
Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
[more]

front cover of Zero Days, Thousands of Nights
Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]


Send via email Share on Facebook Share on Twitter