You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A fresh and refined appraisal of today's top cyber threats
We live in an age of subterfuge. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm. Even before the 2016 election, he warned that Russian military intelligence was 'carefully planning and timing a high-stakes political campaign' to disrupt the democratic process. But as crafty as such so-called active measures have become, they are not new. In this astonishing journey through a century of secret psychological war, Rid reveals for the first time some of history's most significant operations - many of them nearly beyond belief. A White Russian ploy backfires and brings down a New York police commissioner; a KGB-engineered, anti-Semitic hate campaign creeps back across the Berlin Wall; the CIA backs a fake publishing empire, run by a former Wehrmacht U-boat commander that produces Germany's best jazz magazine.
Thomas Rid’s revelatory history of cybernetics pulls together disparate threads in the history of technology, from the invention of radar and pilotless flying bombs in World War Two to today’s age of CCTV, cryptocurrencies and Oculus Rift, to make plain that our current anxieties about privacy and security will be emphatically at the crux of the new digital future that we have been steadily, sometimes inadvertently, creating for ourselves. Rise of the Machines makes a singular and significant contribution to the advancement of our clearer understanding of that future – and of the past that has generated it. PRAISE FOR THOMAS RID ‘A fascinating survey of the oscillating hopes and fears expressed by the cybernetic mythos.’ The Wall Street Journal ‘Thoughtful, enlightening … a mélange of history, media studies, political science, military engineering and, yes, etymology … A meticulous yet startling alternate history of computation.’ New Scientist
This is the first academic analysis of the role of embedded media in the 2003 Iraq War, providing a concise history of US military public affairs management since Vietnam. In late summer 2002, the Pentagon considered giving the press an inside view of the upcoming invasion of Iraq. The decision was surprising, and the innovative "embedded media program" itself received intense coverage in the media. Its critics argued that the program was simply a new and sophisticated form of propaganda. Their implicit assumption was that the Pentagon had become better at its news management and had learned to co-opt the media. This new book tests this assumption, introducing a model of organizational learn...
This textbook offers an accessible introduction to counterinsurgency operations, a key aspect of modern warfare. Featuring essays by some of the world’s leading experts on unconventional conflict, both scholars and practitioners, the book discusses how modern regular armed forces react, and should react, to irregular warfare. The volume is divided into three main sections: Doctrinal Origins: analysing the intellectual and historical roots of modern Western theory and practice Operational Aspects: examining the specific role of various military services in counterinsurgency, but also special forces, intelligence, and local security forces Challenges: looking at wider issues, such as governance, culture, ethics, civil-military cooperation, information operations, and time. Understanding Counterinsurgency is the first comprehensive textbook on counterinsurgency, and will be essential reading for all students of small wars, counterinsurgency and counterterrorism, strategic studies and security studies, both in graduate and undergraduate courses as well as in professional military schools.
Examines the relevance of the changes in the media environment for the conduct of armed conflict and war, particularly as it relates to irregular warfare. Argues that new media provide an advantage to unconventional forces and discusses the reactions that regular forces should have in order to temper this advantage.
“A must-read...It reveals important truths.” —Vint Cerf, Internet pioneer “One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” —Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and fo...
Cyber-warfare is often discussed, but rarely truly seen. When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime. Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict. Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations. By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel. Offensive cyb...
The classic ghost story from Penelope Lively, one of the modern greats of British fiction for adults and children alike.When James' family moves to a ancient cottage in Oxfordshire (with grounds that are great for excavations and trees that are perfect for climbing), it doesn't take long for odd things to stard happening. Doors crash open and strange signs appear, written in an archaic hand. James soon discovers the culprit: a ghost! It's the spirit of Thomas Kempe, a 17th century apothecary who wants James to be his apprentice. The problem? No one else believes in ghosts. It's up to James to get rid of him... An iconic ghost story for children, The Ghost of Thomas Kempe is adored by generations of readers.
Computer attacks, whether by petty criminals or rogue states, are in ill that the modern age has yet to tackle