In a post-Cold War world of political unease and economic crisis, processes of securitisation are transforming nation-states, their citizens and non-citizens in profound ways.
The book shows how contemporary Europe is now home to a vast security industry which uses biometric identification systems, CCTV and quasi-military techniques to police migrants and disadvantaged neighbourhoods. This is the first collection of anthropological studies of security with a particular but not exclusive emphasis on Europe.
The Anthropology of Security draws together studies on the lived experiences of security and policing from the perspective of those most affected in their everyday lives. The anthropological perspectives in this volume stretch from the frontlines of policing and counter-terrorism to border control.
“Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how.”
—Lawrence Lessig
“Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace—explain how a new technology will upend the current legal and social order… Blockchain and the Law is not just a theoretical guide. It’s also a moral one.”
—Fortune
Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you “mine” money from ones and zeros?
The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create “smart contracts,” to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities’ ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking.
“If you…don’t ‘get’ crypto, this is the book-length treatment for you.”
—Tyler Cowen, Marginal Revolution
“De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address.”
—James Ryerson, New York Times Book Review
Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet
Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences.
Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.
Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.
In recent years, popular media has inundated audiences with sensationalized headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives.
From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognizing the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies.
Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable circumstances, these technologies allow us to create new spaces of affinity, and a new politics of change.
Advocates a cybersecurity “social contract” between government and business in seven key economic sectors
Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.
A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.
Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.
“A must-read…It reveals important truths.”
—Vint Cerf, Internet pioneer
“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures
Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists.
Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph.
“A helpful reminder…of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.”
—Jonathan Freedland, New York Review of Books
“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.”
—General David Petraeus, former Director of the CIA
“Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’”
—Richard Harknett, former Scholar-in-Residence at United States Cyber Command
Challenging the Westphalian view of international relations, which focuses on the sovereignty of states and the inevitable potential for conflict, the authors from the Borderlands Study Group reconceive borders as capillaries enabling the flow of material, cultural, and social benefits through local communities, nation-states, and entire regions. By emphasizing local agency and regional interdependencies, this metaphor reconfigures current narratives about the China India border and opens a new perspective on the long history of the Silk Roads, the modern BCIM Initiative, and dam construction along the Nu River in China and the Teesta River in India.
Together, the authors show that positive interaction among people on both sides of a border generates larger, cross-border communities, which can pressure for cooperation and development. India China offers the hope that people divided by arbitrary geo-political boundaries can circumvent race, gender, class, religion, and other social barriers, to form more inclusive institutions and forms of governance.
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world’s technology-crime hotspots.
Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator—specific individuals or groups sitting somewhere behind keyboards and screens. Jonathan Lusthaus lifts the veil on the world of these cybercriminals in the most extensive account yet of the lives they lead, and the vast international industry they have created.
We are long past the age of the lone adolescent hacker tapping away in his parents’ basement. Cybercrime now operates like a business. Its goods and services may be illicit, but it is highly organized, complex, driven by profit, and globally interconnected. Having traveled to cybercrime hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, Lusthaus takes us inside this murky underworld and reveals how this business works. He explains the strategies criminals use to build a thriving industry in a low-trust environment characterized by a precarious combination of anonymity and teamwork. Crime takes hold where there is more technical talent than legitimate opportunity, and where authorities turn a blind eye—perhaps for a price. In the fight against cybercrime, understanding what drives people into this industry is as important as advanced security.
Based on seven years of fieldwork from Eastern Europe to West Africa, Industry of Anonymity is a compelling and revealing study of a rational business model which, however much we might wish otherwise, has become a defining feature of the modern world.
Normal0falsefalsefalseMicrosoftInternetExplorer4
Sensational headlines have publicized the drug trafficking, brutal violence, and other organized crime elements associated with Central America's mara gangs, but there have been few clear-eyed analyses of the history, hierarchies, and future of the mara phenomenon. The first book to look specifically at the Central American gang problem by drawing on the perspectives of researchers from different disciplinary backgrounds, Maras: Gang Violence and Security in Central America provides much-needed insight.
These essays trace the development of the gangs, from Mara Salvatrucha to the 18th Street Gang, in Los Angeles and their spread to El Salvador, Honduras, Guatemala, and Nicaragua as the result of members' deportation to Central America; there, they account for high homicide rates and threaten the democratic stability of the region. With expertise in areas ranging from political science to law enforcement and human rights, the contributors also explore the spread of mara violence in the United States. Their findings comprise a complete documentation that spans sexualized violence, case studies of individual gangs, economic factors, varied responses to gang violence, the use of intelligence gathering, the limits of state power, and the role of policy makers.
Raising crucial questions for a wide readership, these essays are sure to spark productive international dialogues.
An interdisciplinary study charting the war against microbial futures leads to a new theory of contemporary vision and visuality
In 1989, a group of U.S. government scientists met to discuss some surprising findings: new diseases were appearing around the world, and viruses that they thought long vanquished were resurfacing. Their appearance heralded a future perpetually threatened by unforeseeable biological risks, sparking a new concept of disease: the “emerging microbe.” With the Cold War nearing its end, American scientists and security experts turned to confront this new “enemy,” redirecting national security against its risky horizons. In order to be fought, emerging microbes first needed to be made perceptible; but how could something immaterial, unknowable, and ever mutating be coaxed into visibility, knowability, and operability?
Microbial Resolution charts the U.S.-led war on the emerging microbe to show how their uncertain futures were transformed into objects of global science and security. Moving beyond familiar accounts that link scientific knowledge production to optical practices of visualizing the invisible, Gloria Chan-Sook Kim develops a theory of “microbial resolution” to analyze the complex problematic that arises when dealing with these entities: what can be seen when there is nothing to see? Through a syncretic analysis of data mining, animal-tracking technologies, media networks, computer-modeled futures, and global ecologies and infrastructures, she shows how a visual impasse—the impossibility of seeing microbial futures—forms the basis for new modes of perceiving, knowing, and governing in the present.
Timely and thought provoking, Microbial Resolution opens up the rich paradoxes, irreconcilabilities, and failures inherent in this project and demonstrates how these tensions profoundly animate twenty-first-century epistemologies, aesthetics, affects, and ecologies.
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.
Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.
This collection gathers a unique group of contributors, including representatives from Congress, the United Nations, and Israel’s Ministry of Justice, as well as senior diplomats from Canada, Bulgaria, Portugal, Spain, and Turkey. Presenting their diverse perspectives, the contributors address regional and policy issues related to the mass migration of people, as well as questions concerning citizenship and national security, human trafficking in the form of prostitution, and cultural discrimination. The result is a multifaceted exploration of issues underlying many of the world’s economic, security, and social challenges. Other topics include the impact of state failure on migration, immigration in California, security measures and “preferred” immigrants in Canada after September 11, 2001, and Albanian migration into Greece.
Contributors. Alexandre Afonso, David Binder, Andrew C. Danopoulos, Constantine P. Danopoulos, Francis M. Deng, Mohamed A. El-Khawas, Omar G. Encarnación, Rochelle Gershuni, Larry L. Gerston, Ahmet Içduygu, Benjamin Kline, Bojan Korenic, Erin Kruger, Robert S. Leiken, Marlene Mulder, Elena Poptodorova, Tom Tancredo
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them.
In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.
Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.
Security and development matter: they often involve issues of life and death and they determine the allocation of truly staggering amounts of the world’s resources. Particularly since the start of the wars in Afghanistan and Iraq, there has been momentum in policy circles to merge the issues of security and development to attempt to end conflicts, create durable peace, strengthen failing states, and promote the conditions necessary for people to lead healthier and more prosperous lives.
In many ways this blending of security and development agendas seems admirable and designed to produce positive outcomes all around. However, it is often the case that the two concepts in combination do not receive equal weight, with security issues getting priority over development concerns. This is not desirable and actually undermines security in the longer term. Moreover, there are major challenges in practice when security practitioners and development practitioners are asked to agree on priorities and work together.
Security and Development in Global Politics illuminates the common points of interest but also the significant differences between security and development agendas and approaches to problem solving. With insightful chapter pairings—each written by a development expert and a security analyst—the book explores seven core international issues: aid, humanitarian assistance, governance, health, poverty, trade and resources, and demography. Using this comparative structure, the book effectively assesses the extent to which there really is a nexus between security and development and, most importantly, whether the link should be encouraged or resisted.
September 11, 2001, distinguished Cold War historian John Lewis Gaddis argues, was not the first time a surprise attack shattered American assumptions about national security and reshaped American grand strategy. We've been there before, and have responded each time by dramatically expanding our security responsibilities.
The pattern began in 1814, when the British attacked Washington, burning the White House and the Capitol. This early violation of homeland security gave rise to a strategy of unilateralism and preemption, best articulated by John Quincy Adams, aimed at maintaining strength beyond challenge throughout the North American continent. It remained in place for over a century. Only when the Japanese attacked Pearl Harbor in 1941 did the inadequacies of this strategy become evident: as a consequence, the administration of Franklin D. Roosevelt devised a new grand strategy of cooperation with allies on an intercontinental scale to defeat authoritarianism. That strategy defined the American approach throughout World War II and the Cold War.
The terrorist attacks of 9/11, Gaddis writes, made it clear that this strategy was now insufficient to ensure American security. The Bush administration has, therefore, devised a new grand strategy whose foundations lie in the nineteenth-century tradition of unilateralism, preemption, and hegemony, projected this time on a global scale. How successful it will be in the face of twenty-first-century challenges is the question that confronts us. This provocative book, informed by the experiences of the past but focused on the present and the future, is one of the first attempts by a major scholar of grand strategy and international relations to provide an answer.
In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.
Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives—does the industry release viruses to generate demand for antivirus software?—and considers the dynamics within companies by looking at facets such as gender bias and power politics. Technological Turf Wars is an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.
READERS
Browse our collection.
PUBLISHERS
See BiblioVault's publisher services.
STUDENT SERVICES
Files for college accessibility offices.
UChicago Accessibility Resources
home | accessibility | search | about | contact us
BiblioVault ® 2001 - 2024
The University of Chicago Press