Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
65
result(s) for
"Hacking Political aspects"
Sort by:
A hacker's mind : how the powerful bend society's rules, and how to bend them back
by
Schneier, Bruce, 1963- author
in
Hacking Social aspects.
,
Hacking Political aspects.
,
Hacking Economic aspects.
2023
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
The Internet in Everything
by
DeNardis, Laura
in
Communication Studies
,
Computer security
,
Cyberinfrastructure -- Security measures
2020
A compelling argument that the Internet of things threatens human rights and security and that suggests policy prescriptions to protect our future The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things-connecting everything from cars to cardiac monitors to home appliances-there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. Laura DeNardis argues that this diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and she offers new cyber-policy solutions. In her discussion, she makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future.
Why hackers win : power and disruption in the network society
by
Burkart, Patrick, 1969- author
,
McCourt, Tom, 1958- author
in
Hackers.
,
Hacking Political aspects.
2019
\"When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the 'trusted systems' underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking\"-- Provided by publisher.
Low-fidelity policy design, within-design feedback, and the Universal Credit case
2024
Policy design approaches currently pay insufficient attention to feedback that occurs during the design process. Addressing this endogenous policy design feedback gap is pressing as policymakers can adopt ‘low-fidelity’ design approaches featuring compressed and iterative feedback-rich design cycles. We argue that within-design feedback can be oriented to the components of policy designs (instruments and objectives) and serve to reinforce or undermine them during the design process. We develop four types of low-fidelity design contingent upon the quality of feedback available to designers and their ability to integrate it into policy design processes: confident iteration and stress testing, advocacy and hacking, tinkering and shots in the dark, or coping. We illustrate the utility of the approach and variation in the types, use, and impacts of within-design feedback and low-fidelity policy design through an examination of the UK’s Universal Credit policy.
Journal Article
Common circuits : hacking alternative technological futures
by
Murillo, Luis Felipe R. author
in
Information technology Social aspects
,
Information technology Political aspects
,
Hacking Social aspects
2025
\"How hackers facilitate community technology projects that counter the monoculture of \"big tech\" and point us to brighter, innovative horizons. A digital world in relentless movement--from artificial intelligence to ubiquitous computing--has been captured and reinvented as a monoculture by Silicon Valley \"big tech\" and venture capital firms. Yet very little is discussed in the public sphere about existing alternatives. Based on long-term field research across San Francisco, Tokyo, and Shenzhen, Common Circuits explores a transnational network of hacker spaces that stand as potent, but often invisible, alternatives to the dominant technology industry. In what ways have hackers challenged corporate projects of digital development? How do hacker collectives prefigure more just technological futures through community projects? Luis Felipe R. Murillo responds to these urgent questions with an analysis of the hard challenges of collaborative, autonomous community-making through technical objects conceived by hackers as convivial, shared technologies. Through rich explorations of hacker space histories and biographical sketches of hackers who participate in them, Murillo describes the social and technical conditions that allowed for the creation of community projects such as anonymity and privacy networks to counter mass surveillance; community-made monitoring devices to measure radioactive contamination; and small-scale open hardware fabrication for the purposes of technological autonomy. Murillo shows how hacker collectives point us toward brighter technological futures--a renewal of the \"digital commons\"--where computing projects are constantly being repurposed for the common good\"-- Provided by publisher.
Government Hacking
2018
The United States government hacks computer systems for law enforcement purposes. As encryption and anonymization tools become more prevalent, the government will foreseeably increase its resort to malware. Law enforcement hacking poses novel puzzles for criminal procedure. Courts are just beginning to piece through the doctrine, and scholarship is scant. This Article provides the first comprehensive examination of how federal law regulates government malware. Part I of the Article considers whether the Fourth Amendment regulates law enforcement hacking. This issue has sharply divided district courts because, unlike a conventional computer search, hacking usually does not involve physical contact with a suspect's property. The Article provides a technical framework for analyzing government malware, then argues that a faithful application of Fourth Amendment principles compels the conclusion that government hacking is inherently a search. Part II analyzes the positive law that governs law enforcement hacking, answering fundamental criminal procedure questions about initiating a search, establishing probable cause and particularity, venue, search duration, and notice. A review of unsealed court filings demonstrates that the government has a spotty compliance record with these procedural requirements. The Article also argues for reinvigorating super-warrant procedures and applying them to law enforcement hacking. Finally, Part III uses government malware to illuminate longstanding scholarly debates about Fourth Amendment law and the structure of surveillance regulation. Law enforcement hacking sheds new light on the interbranch dynamics of surveillance, equilibrium adjustment theories for calibrating Fourth Amendment law, and the interplay between statutory and constitutional privacy protections.
Journal Article
Cyberwars in the Middle East
\"Cyber Wars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption.This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks\"-- Provided by publisher.
Subjects of Quantum Measurement: Surveillance and Affect in the War on Terror
2022
Abstract
The idea of measurement (of bodies and identities) is a guiding principle of globalized surveillance in the War on Terror. Nevertheless, this inherently scientific notion is so naturalized in public and academic discourse that its meaning and implications are left undiscussed. This paper builds on quantum theory to present an immanent critique of measurement in surveillance. Foregrounding surveillance's transdisciplinary conceptual foundations, it argues that a notion of identity measurement centered on ambiguity and embodiment, rather than fixity and abstraction, reshapes the scope for political action and opens new avenues for critique. I suggest that a lack of critical engagement with the concept of measurement accounts for Surveillance Studies’ and International Political Sociology's difficulty in exploring the relation between the material–affective dimension of surveillance and its identity-fixing function. Challenging unquestioned notions of measurement in social science, quantum theory highlights the interconnected importance of ambiguity and embodiment in processes of identity measurement. Through the case of airport security, I illustrate how quantum measurement departs from recent critical accounts of surveillance—concerned with the fixity of unambiguous identities and the digital abstraction of bodies—and foregrounds the ambiguity of affect to postulate new forms of agency and resistance to the politics of surveillance.
Journal Article
Likewar : the weaponization of social media
\"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away\"-- Provided by publisher.
Cyber conflict or democracy “hacked”? How cyber operations enhance information warfare
2020
Are cyber-enabled information warfare (IW) campaigns uniquely threatening when compared with traditional influence operations undertaken by state actors? Or is the recent “hacking” of Western democracies simply old wine in new—but fundamentally similar—bottles? This article draws on classical theories of democratic functionality from the political science and communications studies fields to deconstruct the aims and effects of cyber-enabled IW. I describe democracies as information systems wherein the moderating functions of democratic discourse and policy deliberation rely on robust mechanisms for asserting the credibility, origination, and quality of information. Whereas the institutions of democracy are often compromised in ways that force failures of the system’s moderating dynamics, influence operations in the digital age act to subvert the traditional mechanisms of democratic functionality in new ways. Sophisticated digital age information operations create a multifaceted attribution challenge to the target state that amounts to unprecedented uncertainty about the nature and scope of the threat. However, the promise of cyber-enabled IW capabilities emerges more from the rewiring of modern democratic information environments around new media platforms than it does from the cyber conflict faculties of state actors. Rather, cyber operations act as an adjunct modifier of IW abilities that allow belligerent governments to secure new sources of private information, to divert attention from other pillars of IW campaigns, to compromise the capabilities of domestic counterintelligence assets and to tacitly coerce important members of society.
Journal Article