Leaks, Hacks, and Scandals


Book Description

How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.




Trials of Arab Modernity


Book Description

Challenging prevalent conceptualizations of modernity—which treat it either as a Western ideology imposed by colonialism or as a universal narrative of progress and innovation—this study instead offers close readings of the simultaneous performances and contestations of modernity staged in works by authors such as Rifa’a al-Tahtawi, Ahmad Faris al-Shidyaq, Tayeb Salih, Hanan al-Shaykh, Hamdi Abu Golayyel, and Ahmad Alaidy. In dialogue with affect theory, deconstruction, and psychoanalysis, the book reveals these trials to be a violent and ongoing confrontation with and within modernity. In pointed and witty prose, El-Ariss bridges the gap between Nahda (the so-called Arab project of Enlightenment) and postcolonial and postmodern fiction.




Leaks, Hacks, and Scandals


Book Description

How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.




Information is Beautiful


Book Description

Miscellaneous facts and ideas are interconnected and represented in a visual format, a "visual miscellaneum," which represents "a series of experiments in making information approachable and beautiful" -- from p.007




The Event of Postcolonial Shame


Book Description

In a postcolonial world, where structures of power, hierarchy, and domination operate on a global scale, writers face an ethical and aesthetic dilemma: How to write without contributing to the inscription of inequality? How to process the colonial past without reverting to a pathology of self-disgust? Can literature ever be free of the shame of the postcolonial epoch--ever be truly postcolonial? As disparities of power seem only to be increasing, such questions are more urgent than ever. In this book, Timothy Bewes argues that shame is a dominant temperament in twentieth-century literature, and the key to understanding the ethics and aesthetics of the contemporary world. Drawing on thinkers such as Jean-Paul Sartre, Frantz Fanon, Theodor Adorno, and Gilles Deleuze, Bewes argues that in literature there is an "event" of shame that brings together these ethical and aesthetic tensions. Reading works by J. M. Coetzee, Joseph Conrad, Nadine Gordimer, V. S. Naipaul, Caryl Phillips, Ngugi wa Thiong'o, and Zoë Wicomb, Bewes presents a startling theory: the practices of postcolonial literature depend upon and repeat the same structures of thought and perception that made colonialism possible in the first place. As long as those structures remain in place, literature and critical thinking will remain steeped in shame. Offering a new mode of postcolonial reading, The Event of Postcolonial Shame demands a literature and a criticism that acknowledge their own ethical deficiency without seeking absolution from it.




Sandworm


Book Description

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.




The Arab Renaissance


Book Description

"An anthology of Arabic texts and English translations of works from the Arab Renaissance (Nahda) on modernity, language, gender, transnationalism, literary criticism, politics, travel, social justice, technology, history, and commerce. The edition is designed for the classroom, with an introduction, translator's note, and textual notes for students and teachers"--




Technics Improvised


Book Description

Seeing new media art as an entry point for better understanding of technology and worldmaking futures In this challenging work, a leading authority on new media art examines that curatorial and aesthetic landscape to explore how art resists and rewires the political and economic structures that govern technology. How do inventive combinations of artistic and theoretical improvisation counter the extent to which media art remains at risk, not just from the quarantines of a global pandemic but also from the very viral and material conditions of technology? How does global media art speak back to the corporate closures of digital euphoria as clothed in strategies of digital surveillance, ecological deprivation, and planned obsolescence? In Technics Improvised, Timothy Murray asks these questions and more. At the intersection of global media art, curatorial practice, tactical media, and philosophy, Murray reads a wide range of creative performances and critical texts that envelop artistic and digital materials in unstable, political relations of touch, body, archive, exhibition, and technology. From video to net art and interactive performance, he considers both canonical and unheralded examples of activist technics that disturb the hegemony of biopolitical/digital networks by staging the very touch of the unsettling discourse erupting from within. In the process, critical dialogues emerge between a wide range of artists and theorists, from Hito Steyerl, Ricardo Dominguez, Joan Jonas, Isaac Julien, Ryoji Ikeda, and Shadi Nazarian to Gilles Deleuze, Jean-Luc Nancy, Elizabeth Povinelli, Jean-François Lyotard, Erin Manning, Achille Mbembe, and Samuel Weber. Brilliantly conceived and argued and eloquently written, Technics Improvised points the way to how artistic and theoretical practice can seize on the improvisational accidents of technics to activate creativity, thought, and politics anew.




The WikiLeaks Files


Book Description

WikiLeaks came to prominence in 2010 with the release of 251,287 top-secret State Department cables, which revealed to the world what the US government really thinks about national leaders, friendly dictators, and supposed allies. It brought to the surface the dark truths of crimes committed in our name: human rights violations, covert operations, and cover-ups. The WikiLeaks Files exposes the machinations of the United States as it imposes a new form of imperialism on the world, one founded on tactics from torture to military action, to trade deals and "soft power," in the perpetual pursuit of expanding influence. The book also includes an introduction by Julian Assange examining the ongoing debates about freedom of information, international surveillance, and justice. An introduction by Julian Assange-writing on the subject for the first time-exposes the ongoing debates about freedom of information, international surveillance, and justice.




Data Breaches


Book Description

Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.