Behold a Pale Farce


Book Description

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion—much like the run-up to the Gulf War or the global war on terror—this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, Behold a Pale Farce covers topics—including cybercrime; modern espionage; mass-surveillance systems; and the threats facing infrastructure targets such as the Federal Reserve, the stock exchange, and telecommunications—in a way that provides objective analysis rather than advocacy. This book is a must-read for anyone concerned with the recent emergence of Orwellian tools of mass interception that have developed under the guise of national security.




Technology and Oligopoly Capitalism


Book Description

Technology and Oligopoly Capitalism is a major contribution to our understanding of how technology oligopolies are shaping America’s social, economic, and political reality. Technology oligopolies are the most powerful socioeconomic entities in America. From cradle to grave, the decisions they make affect the most intimate aspects of our lives, how we work, what we eat, our health, how we communicate, what we know and believe, whom we elect, and how we relate to one another and to nature. Their power over markets, trade, regulation, and most every aspect of our governance is more intrusive and farther-reaching than ever. They benefit from tax breaks, government guarantees, and bailouts that we must pay for and have no control over. Their accumulation of capital creates immense wealth for a minuscule elite, deepening disparities while politics and governance become ever more subservient to their power. They determine our skills and transform employment through the tools and services they create, as no other organizations can. They produce a vast array of goods and services with labor, marketing, and research that are more intrusively controlled than ever, as workplace rights and job security are curtailed or disappear. Our consumption of their products—and their capacity to promote wants—is deep and far reaching, while the waste they generate raises concerns about the survival of life on our planet. And their links to geopolitics and the martial domain are stronger than ever, as they influence how warfare is waged and who will be vanquished. Technology and Oligopoly Capitalism’s critical, multidisciplinary perspective provides a systemic vision of how oligopolistic power shapes these forces and phenomena. An inclusive approach spans the spectrum of technology oligopolies and the ways in which they deploy their power. Numerous, previously unpublished ideas expand the repertory of established work on the topics covered, advancing explanatory quality—to elucidate how and why technology oligopolies operate as they do, the dysfunctions that accompany their power, and their effects on society and nature. This book has no peers in the literature, in its scope, the unprecedented amount and diversity of documentation, the breadth of concepts, and the vast number of examples it provides. Its premises deserve to be taken into account by every student, researcher, policymaker, and author interested in the socioeconomic and political dimensions of technology in America.




The Business of Cyber


Book Description

This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than by the cybersecurity team, who frequently don’t have management as a core skill. In order to effect that change, managers need to have the background and detail to challenge what they are being told, enabling them to engage in a way that will result in more appropriate outcomes for the business. This book provides that background and detail. It debunks a number of cyber-myths, and calls out basic errors in the accepted thinking on cyber. The content is strongly rooted in available research and presented in an accessible manner, with a number of business-related case studies. Each chapter in the book takes a theme such as end-user behaviours and compares the available evidence with what the industry would like to have its customers believe. The conclusion is that there is definitely a problem, and we certainly need cyber defences. Just not the ones the industry is currently selling.




The Rhetorical Invention of America's National Security State


Book Description

The Rhetorical Invention of America’s National Security State examines the rhetoric and discourse produced by and constitutive of America’s national security state. Hasian, Lawson, and McFarlane illustrate the importance of rhetoric to the expansion of the American national security state in the post-9/11 era through their examination of the global war on terrorism, enhanced interrogation techniques, drone crew stress, activities of Edward Snowden, rise of Special Forces, and popular representations of counterterrorism. The coauthors contend this expansion was not the result of lone, imperial executives or a nefarious state within a state, but was co-produced by elite and non-elite Americans alike who not only condoned, but also in many cases demanded, the expansion of the national security state. This work will be of interest to scholars in communication studies and political science.




Georgetown Journal of International Affairs


Book Description

Each spring, the Cyber Project at Georgetown University’s Institute for Law, Science, and Global Security convenes a conference of leading international experts from academia, the private sector, and government to address cutting-edge issues in cybersecurity. The 2014 annual conference is the starting point for this special issue of the Georgetown Journal of International Affairs, the fourth volume in the annual International Engagement on Cyber series. Key papers from the conference have been included in this issue along with new articles added to round out this collaboration between the Cyber Project and the journal. This issue begins with a group of articles under the theme “A Post-Snowden Cyberspace,” describing how Edward Snowden’s revelations directly or indirectly changed the way the global community understands cybersecurity and cyber law. Other topics covered include cyber weapons, cyber deterrence, Japan’s cybersecurity strategy, data protection in the private sector, executive accountability for data breaches, minimum security standards for connected devices, and the problem of underinvestment in cybersecurity. Please note, this special issue is not included in the subscription to the journal. The Georgetown Journal of International Affairs is the official publication of the Edmund A. Walsh School of Foreign Service at Georgetown University. Each issue of the journal provides readers with a diverse array of timely, peer-reviewed content penned by top policymakers, business leaders, and academic luminaries.




Cyberwar and Revolution


Book Description

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks. Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.




Subversion


Book Description

In Subversion, Lennart Maschmeyer provides a powerful new theory and analysis of an age-old concept. While a strategy of subversion offers great strategic promise in theory, it faces an underappreciated set of challenges that limit its strategic value in practice. Drawing from two major cases--the KGB's use of traditional subversion methods to crush the Prague Spring in 1968 and Russia's less successful use of cyberwarfare against Ukraine since 2014--Maschmeyer demonstrates both the benefits and weaknesses of the approach. While many believe that today's cyber-based subversion campaigns offer new strategic opportunities, they also come with their own challenges. Because of these disadvantages, cyber operations continue to fall short of expectations--most recently in the Russo-Ukrainian war. By showing that traditional subversion methods remain the more potent threat, Subversion forces us to reconsider our fears of the subversive potential of cyberwar.




Handbook of Research on Cyber Crime and Information Privacy


Book Description

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.




Myths and Realities of Cyber Warfare


Book Description

This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century. "Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle. The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world. After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.




The Military-Entertainment Complex


Book Description

With the rise of drones and computer-controlled weapons, the line between war and video games continues to blur. In this book, the authors trace how the realities of war are deeply inflected by their representation in popular entertainment. War games and other media, in turn, feature an increasing number of weapons, tactics, and threat scenarios from the War on Terror. While past analyses have emphasized top-down circulation of pro-military ideologies through government public relations efforts and a cooperative media industry, The Military-Entertainment Complex argues for a nonlinear relationship, defined largely by market and institutional pressures. Tim Lenoir and Luke Caldwell explore the history of the early days of the video game industry, when personnel and expertise flowed from military contractors to game companies; to a middle period when the military drew on the booming game industry to train troops; to a present in which media corporations and the military influence one another cyclically to predict the future of warfare. In addition to obvious military-entertainment titles like AmericaÕs Army, Lenoir and Caldwell investigate the rise of best-selling franchise games such as Call of Duty, Battlefield, Medal of Honor, and Ghost Recon. The narratives and aesthetics of these video games permeate other media, including films and television programs. This commodification and marketing of the future of combat has shaped the publicÕs imagination of war in the post-9/11 era and naturalized the U.S. PentagonÕs vision of a new way of war.