“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma"-who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords-Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.
Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can-and do-hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.
Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime-before it's too late.
"Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals... His track record of scoops...has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." -Bloomberg Businessweek
In this book, Singer provides the first account of the military services industry and its broader implications. Corporate Warriors includes a description of how the business works, as well as portraits of each of the basic types of companies: military providers that offer troops for tactical operations; military consultants that supply expert advice and training; and military support companies that sell logistics, intelligence, and engineering.
In an updated edition of P. W. Singer's classic account of the military services industry and its broader implications, the author describes the continuing importance of that industry in the Iraq War. This conflict has amply borne out Singer's argument that the privatization of warfare allows startling new capabilities and efficiencies in the ways that war is carried out. At the same time, however, Singer finds that the introduction of the profit motive onto the battlefield raises troubling questions—for democracy, for ethics, for management, for human rights, and for national security.
* Expanded coverage of risk management * Enhanced coverage of disaster communications, including social networking sites like Twitter * More material on mitigation of disasters * Up-to-date information on the role of FEMA in the Obama administration
The term "blowback," invented by the CIA, refers to the unintended results of American actions abroad. In this incisive and controversial book, Chalmers Johnson lays out in vivid detail the dangers faced by our overextended empire, which insists on projecting its military power to every corner of the earth and using American capital and markets to force global economic integration on its own terms. From a case of rape by U.S. servicemen in Okinawa to our role in Asia's financial crisis, from our early support for Saddam Hussein to our conduct in the Balkans, Johnson reveals the ways in which our misguided policies are planting the seeds of future disaster.
In a new edition that addresses recent international events from September 11 to the war in Iraq, this now classic book remains as prescient and powerful as ever.
Between 1996 and 1998, Aaron Cohen would learn Hebrew and Arabic; become an expert in urban counterterror warfare, the martial art of Krav Maga, and undercover operations; and participate in dozens of life-or-death missions. He would infiltrate a Hamas wedding to seize a wanted terrorist and pose as an American journalist to set a trap for one of the financiers behind the Dizengoff Massacre, taking him down in a brutal, hand-to-hand struggle. A propulsive, gripping read, Cohen's story is a rare, fly-on-the-wall view into the shadowy world of "black ops" that redefines invincible strength, true danger, and inviolable security.
What caused this dramatic turnaround? As this book shows, it was a long way from congressional outrage at TV images of burned bodies of U.S. servicemen in the Iranian desert to the establishment of a special operations force of nearly 45,000 active and reserve personnel. The drama of how this happened sheds light on how public policy is made and implemented. It illustrates the complex interaction between internal forces within the special operations community, as well as between the executive and legislative branches of the U.S. government. The implementation of legislation establishing a special operations capability is seen to rebuild and protect these forces to an extent never imagined by the early "quiet professionals."
While offering insights into how the U.S. government makes policy, Susan Marquis also offers a revealing look at the special operations community, including their storied past, extreme training, and recent operational experience that continues to forge their distinctive organizational mission and culture. She describes the decade-long struggle to rebuild special operations forces, resulting in new SOF organizations with independence that is unique among U.S. military forces, an independence approaching that of a new military service.
Gordon Cucullu, a retired army colonel, was so appalled by these reports that he decided to see for himself. In a series of visits he inspected every corner of the camp and interviewed dozens of personnel, from guards and interrogators to cooks and nurses. The result—coming just as the Obama administration wants to close the facility—is a riveting description of daily life for both prisoners and guards. Cucullu describes the six camps reserved for different levels of compliance, details the treatment of prisoners, and examines their experiences in detail, including the techniques used to interrogate them, the food they eat, their medical care, how they communicate with one another, and the many ingenious ways they contrive to assault and injure their guards.
While some prisoners were indeed treated harshly in the early days, when the hastily built camp was flooded with battlefield captures and fears ran high of another 9/11-style attack, Cucullu finds that these excesses were quickly corrected. Current treatment and oversight routines exceed the standards of any maximum-security prison in the world.
Despite what the public has heard, these are not innocent goatherds but dedicated jihadists whose overriding goal—as they themselves candidly say—is to kill Americans. Should they now be released to return to the fight, perhaps on American soil? Read this book and decide for yourself.
After setting out the political implications of restraint as a guiding principle, Posen sketches the appropriate military forces and posture that would support such a strategy. He works with a deliberately constrained notion of grand strategy and, even more important, of national security (which he defines as including sovereignty, territorial integrity, power position, and safety). His alternative for military strategy, which Posen calls "command of the commons," focuses on protecting U.S. global access through naval, air, and space power, while freeing the United States from most of the relationships that require the permanent stationing of U.S. forces overseas.
Assassination by drone is a subject of deep and enduring fascination. Yet few understand how and why this has become our principal way of waging war. Kill Chain uncovers the real and extraordinary story; its origins in long-buried secret programs, the breakthroughs that made UAV operations possible, the ways in which the technology works and, despite official claims, does not work. Taking the reader inside the well-guarded world of national security, the book reveals the powerful interests - military, CIA and corporate - that have led the drive to kill individuals by remote control. Most importantly of all, the book describes what has really happened when the theories underpinning the strategy -- and the multi-billion dollar contracts they spawn -- have been put to the test. Drawing on sources deep in the military and intelligence establishments, Andrew Cockburn's Kill Chain unveils the true effects, as demonstrated by bloody experience, of assassination warfare, a revelation that readers will find surprising as well as shocking.
Originally published by the U.S. Army to provide an overview of the country's terrain, ethnic groups, and history for American troops and now updated and expanded for the general public, Afghanistan Declassified fills in these gaps. Historian Brian Glyn Williams, who has traveled to Afghanistan frequently over the past decade, provides essential background to the war, tracing the rise, fall, and reemergence of the Taliban. Special sections deal with topics such as the CIA's Predator drone campaign in the Pakistani tribal zones, the spread of suicide bombing from Iraq to the Afghan theater of operations, and comparisons between the Soviet and U.S. experiences in Afghanistan.
To Williams, a historian of Central Asia, Afghanistan is not merely a theater in the war on terror. It is a primeval, exciting, and beautiful land; not only a place of danger and turmoil but also one of hospitable villagers and stunning landscapes, of great cultural diversity and richness. Williams brings the country to life through his own travel experiences—from living with Northern Alliance Uzbek warlords to working on a major NATO base. National heroes are introduced, Afghanistan's varied ethnic groups are explored, key battles—both ancient and current—are retold, and this land that many see as only a frightening setting for prolonged war emerges in three dimensions.
In one indispensable volume, top practitioners and scholars in the field explain the importance of counterintelligence today and explore the causes of—and practical solutions for—U.S. counterintelligence weaknesses. These experts stress the importance of developing a sound strategic vision in order to improve U.S. counterintelligence and emphasize the challenges posed by technological change, confused purposes, political culture, and bureaucratic rigidity. Vaults, Mirrors, and Masks skillfully reveals that robust counterintelligence is vital to ensuring America's security.
Published in cooperation with the Center for Peace and Security Studies and the George T. Kalaris Memorial Fund, Edmund A. Walsh School of Foreign Service, Georgetown University.
Acclaimed for its vivid, poignant, and honest recreation of sixteen brutal months of nearly continuous battle in the deadly Hindu Kesh, Outlaw Platoon is a Band of Brothers or We Were Soldiers Once and Young for the early 21st century—an action-packed, highly emotional true story of enormous sacrifice and bravery.
A magnificent account of heroes, renegades, infidels, and brothers, it stands with Sebastian Junger’s War as one of the most important books to yet emerge from the heat, smoke, and fire of America’s War in Afghanistan.
Every student of law and society knows this book, and it is available again with a new Foreword by Candace McCoy and a new Preface by the author. Fifty years after his innovative research began, the continuity and change of policing and law is seen again, in all its richness and nuance. Also available in new paperback and hardcover printings of the Fourth Edition, by Quid Pro Books.
The contributors dissect mistakes, false starts, and lessons learned from the cases of Afghanistan and Iraq within the broader context of reconstruction efforts in other parts of the world, including Latin America, Japan, and the Balkans. Examining the contrasting models in Afghanistan and Iraq, they highlight the Coalition Provisional Authority in Iraq as a cautionary example of inadequate planning.
The need for post-conflict reconstruction will not cease with the end of the Afghanistan and Iraq missions. This timely volume offers the critical reflection and evaluation necessary to avoid repeating costly mistakes in the future.
Contributors: Larry Diamond, Hoover Institution and Stanford University; James Dobbins, RAND; David Ekbladh, American University; Michèle A. Flournoy, Center for Strategic and International Studies; Francis Fukuyama, Paul H. Nitze School of Advanced International Studies, Johns Hopkins University; Larry P. Goodson, U.S. Army War College; Johanna Mendelson Forman, UN Foundation; Minxin Pei, Samia Amin, and Seth Garz, Carnegie Endowment for International Peace; S. Frederick Starr, Central Asia–Caucacus Institute at Johns Hopkins School of Advanced International Studies; F. X. Sutton, Ford Foundation Emeritus; Marvin G. Weinbaum, University of Illinois at Urbana–Champaign
No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
Spykman looked beyond the immediate strategic requirements of the Second World War, envisioning a postwar world in which the United States would help shape the global balance of power to meet its security needs. Even though Soviet Russia was our wartime ally, Spykman recognized that a geopolitically unbalanced Soviet Union could threaten to upset the postwar balance of power and thereby endanger U.S. security. Spykman also foresaw the rise of China in postwar Asia, and the likely need for the United States to ally itself with Japan to balance China's power. He also recognized that the Middle East would play a pivotal role in the postwar world.
Spykman influenced American postwar statesmen and strategists. During the Cold War, the U.S. sought to deny the Soviet Union political control of Western Europe, the Middle East, and East Asia. Spykman's geopolitical vision of U.S. security, supported by a balanced Eurasian land mass, coupled with his focus on power as the governing force in international relations, makes America's Strategy in World Politics relevant to the twenty-first century.
The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies:
Part I: The evolution of intelligence studies;
Part II: Abstract approaches to intelligence;
Part III: Historical approaches to intelligence;
Part IV: Systems of intelligence;
Part V: Contemporary challenges.
With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way.
This Companion will be essential reading for students of intelligence studies and strategic studies, and highly recommended for students of defence studies, foreign policy, Cold War studies, diplomacy and international relations in general.
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report
This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.