Threat Talk


Book Description

'Threat Talk' exposes how US and Chinese scientists and policy-makers have understood and responded to the problem of internet addiction in their societies. Is the internet good or bad for society? American analysts like Lessig and Zittrain suggest that the internet is inherently liberating and positive for society, while Morozov and Sageman warn that the internet poses risks to citizens and societies. Using a comparative framework to illustrate how the two states differ in their assessments of the risks to citizens posed by the introduction of new technology, Mary Manjikian compellingly argues that both 'risk' and 'disease' are ideas which are understood differently at different historic periods and in different cultures. Her culturalist approach claims that the internet is neither inherently helpful, nor inherently threatening. Rather, its role and the dangers it poses may be understood differently by different societies. Is the internet good or bad for society? The answer, it appears, is 'it depends'.




The Age of Surveillance Capitalism


Book Description

The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.




47TH STATE THREAT


Book Description

Retired covert operative, Creed Emerson is hired by his former boss, Bob Farber, to find Farber’s niece who’s missing in New Mexico. In the first twenty-four hours of Creed’s investigation at the remote location just north of the Mexico border, he finds the case is more than a simple disappearance. Creed discovers a biker gang terrorizing the town of Harrison, a shadow corporation buying up all the property in the area, and a mysterious military-industrial complex that nobody seems to know about. As Creed digs deeper, he uncovers an imminent threat to national security.




Risk Centric Threat Modeling


Book Description

This book introduces the Process for Attack Simulation &Threat Analysis (PASTA) threat modeling methodology. It provides anintroduction to various types of application threat modeling andintroduces a risk-centric methodology aimed at applying securitycountermeasures that are commensurate to the possible impact thatcould be sustained from defined threat models, vulnerabilities,weaknesses, and attack patterns. This book describes how to apply application threat modeling asan advanced preventive form of security. The authors discuss themethodologies, tools, and case studies of successful applicationthreat modeling techniques. Chapter 1 provides an overview ofthreat modeling, while Chapter 2 describes the objectives andbenefits of threat modeling. Chapter 3 focuses on existing threatmodeling approaches, and Chapter 4 discusses integrating threatmodeling within the different types of Software DevelopmentLifecycles (SDLCs). Threat modeling and risk management is thefocus of Chapter 5. Chapter 6 and Chapter 7 examine Processfor Attack Simulation and Threat Analysis (PASTA). Finally, Chapter8 shows how to use the PASTA risk-centric threat modeling processto analyze the risks of specific threat agents targeting webapplications. This chapter focuses specifically on the webapplication assets that include customer’s confidential dataand business critical functionality that the web applicationprovides. • Provides a detailed walkthrough of the PASTAmethodology alongside software development activities,normally conducted via a standard SDLC process • Offers precise steps to take when combating threats tobusinesses • Examines real-life data breach incidents and lessons forrisk management Risk Centric Threat Modeling: Process for Attack Simulationand Threat Analysis is a resource for software developers,architects, technical risk managers, and seasoned securityprofessionals.




State of Threat


Book Description

Increasing US&– China tensions, Russia' s invasion of Ukraine, disruptions to supply chains and maritime trade, right-wing extremism, gangs and the drug trade . . . The international and domestic security environment is dynamic and fraught. In State of Threat, local and international academics and sector experts discuss the issues facing New Zealand across defence, diplomacy, intelligence, policy, trade and border management.This timely and up-to-date analysis of New Zealand' s most important security issues is a must-read for policy analysts, those working in risk management and industry leaders across all sectors of the economy.




Global Power of Talk


Book Description

The Global Power of Talk explores the power of negotiation and diplomacy in US foreign policy at a critical juncture in US history. Beginning with the failure of US diplomacy in relation to Saddam Hussein's regime in the 1980s, it shows how a series of diplomatic blunders has laid the foundations for the uninhibited use of 'gun power' over 'talk power' in the last two decades. It critically examines missed opportunities in America's handling of the Israeli-Palestinian conflict in both the Clinton and George W. Bush administrations. In a provocative conclusion, the authors argue that the United States can and should negotiate with the so-called 'unengageables' like Iran, North Korea, and Al-Qaeda, in order to find ways to defuse underlying tensions in the global system.




Whistling Vivaldi


Book Description

Examines the role of what the author calls identity contingencies in the lives of individuals and in society as a whole, focusing on stereotype threat, arguing that people who believe they may be judged based on a bad stereotype do not perform as well, and showing how to overcome the problem.







Threat Assessment and Management Strategies


Book Description

The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100 new pages of material, including several new chapters, charts, and illustrations, as well as up




Rage


Book Description

Rage is an unprecedented and intimate tour de force of new reporting on the Trump presidency facing a global pandemic, economic disaster and racial unrest. Woodward, the #1 international bestselling author of Fear: Trump in the White House, has uncovered the precise moment the president was warned that the Covid-19 epidemic would be the biggest national security threat to his presidency. In dramatic detail, Woodward takes readers into the Oval Office as Trump’s head pops up when he is told in January 2020 that the pandemic could reach the scale of the 1918 Spanish Flu that killed 675,000 Americans. In 17 on-the-record interviews with Woodward over seven volatile months—an utterly vivid window into Trump’s mind—the president provides a self-portrait that is part denial and part combative interchange mixed with surprising moments of doubt as he glimpses the perils in the presidency and what he calls the “dynamite behind every door.” At key decision points, Rage shows how Trump’s responses to the crises of 2020 were rooted in the instincts, habits and style he developed during his first three years as president. Revisiting the earliest days of the Trump presidency, Rage reveals how Secretary of Defense James Mattis, Secretary of State Rex Tillerson and Director of National Intelligence Dan Coats struggled to keep the country safe as the president dismantled any semblance of collegial national security decision making. Rage draws from hundreds of hours of interviews with firsthand witnesses as well as participants’ notes, emails, diaries, calendars and confidential documents. Woodward obtained 25 never-seen personal letters exchanged between Trump and North Korean leader Kim Jong Un, who describes the bond between the two leaders as out of a “fantasy film.” Trump insists to Woodward he will triumph over Covid-19 and the economic calamity. “Don’t worry about it, Bob. Okay?” Trump told the author in July. “Don’t worry about it. We’ll get to do another book. You’ll find I was right.”