Cybersecurity Reading List

dsc01657

If you’re interested in cybersecurity, Aaron Gluck Thaler, a student of Gabriella Coleman, has created a fantastic reading list. So I you have some time, and you like reading this is how you can spend it:

What is Critical? What is Security?

– Columba Peoples and Nick Vaughan‐Williams, Critical Security Studies: An Introduction (New York:
Routledge, 2010): 1‐88.
– “The Increasing insecurity of security studies: Conceptualizing security in the last twenty years,” Contemporary Security Policy, 20(3): 72-101. 
– Mark Neocleous and George Rigakos, ‘Anti‐Security: A Declaration’, in Mark Neocleous and George Rigakos, eds., Anti‐Security (Ottawa: Red Quill Books, 2011): 15‐21. 
– Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.

Schools in Critical Security Studies 

– Ole Waever, ‘Aberystwyth, Paris, Copenhagen: the Europeanness of new “schools” of security theory in an American field’, in Arlene B. Tickner and David L. Blaney, eds., Thinking International Relations Differently (New York: Routledge, 2012): 48‐71. 
– Mark B. Salter and Miguel de Larrinaga, ‘Cold Case: A Manifesto for Canadian Critical Security Studies’, Critical Studies on Security 2:1 (2014). 
– Hansen, Lene. (2000) The Little Mermaid’s Silent Security Dilemma and the Absence of Gender  in the Copenhagen School. Millenium 29:285-306.
– Nik Hynek and David Chandler, ‘No emancipatory alternative, no critical security studies’, Critical Studies on Security 1:1 (2013): 46‐63. 

NatSec

– Arnold Wolfers, 1952. “National Security as an Ambiguous Symbol” Political Science Quarterly 23.
– Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161.
– Forcese, Craig and Roach, Kent, Introduction (False Security: The Radicalization of Canadian Anti-Terrorism) (September 3, 2015). False Security: The Radicalization of Canadian Anti-terrorism, Forthcoming. Available at SSRN: http://ssrn.com/abstract=2655781
– Public Safety Canada. Our Security, Our Rights: National Security Green Paper, 2016. http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-scrt-grn-ppr-2016-bckgrndr/index-en.aspx
– Michels, R. (1915). The Iron Law of Oligarchy, in Political parties: A sociological study of the oligarchical tendencies of modern democracy. Hearst’s International Library Company.
– Weber, M. (1968). The types of legitimate domination.
– Savage, C. (2015). Power Wars: Inside Obama’s Post-9/11 Presidency. New York: Little Brown and Company.
– The International Code of Conduct for Information Security: https://citizenlab.org/2015/09/international-code-of-conduct/
– Jack Goldsmith, Cybersecurity Treaties: A Skeptical View, KORET-TAUBE TASK FORCE ON NAT’L SEC. AND LAW FUTURE CHALLENGES ESSAY SERIES, HOOVER INST. (2011), http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf
– Tamir Israel, Christopher Parsons in Law, Privacy and Surveillance in Canada in the Post-Snowden Era http://www.ruor.uottawa.ca/bitstream/10393/32424/1/9780776621838_WEB.pdf
– Tilly, C. (1985). War making and state making as organized crime. Violence: A reader.
– Jonathan Mayer, Surveillance Law, first offered by Stanford Law School on Coursera. Government Hacking. https://www.youtube.com/watch?v=hlCYvmRg1ok

Surveillance or Security? 

– Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., … & Rivest, R. L. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, tyv009. https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf 
– Matthew Jones (2016). Great Exploitations: Data Mining, Legal Modernization, and the NSA. https://www.youtube.com/watch?v=Qx4Wupf1okc
– Landau, S. (2011). Surveillance or security?: The risks posed by new wiretapping technologies. Mit Press.
– Jeanne Theoharis. “I FEEL LIKE A DESPISED INSECT”: COMING OF AGE UNDER SURVEILLANCE IN NEW YORK
– Schlanger, M. (2015). Intelligence Legalism and the National Security Agency’s Civil Liberties Gap. Harvard National Security Journal, 6. http://harvardnsj.org/wp-content/uploads/2015/02/Schlanger.pdf 
– Report: Impacts of surveillance on contemporary British activism

Infosec 

– Cyril, Malkia. “Black Americans and Encryption: The Stakes are Higher than Apple v. FBI.” The Guardian (Mar 21, 2016). 
– Eric Geller. A complete guide to the new ‘Crypto Wars’. http://www.dailydot.com/layer8/encryption-crypto-wars-backdoors-timeline-security-privacy/
– Waddell, Kaveh. “Encryption is a Luxury.” The Atlantic (Mar 28, 2016).
– Lex Gill. Law, Metaphor and the Encrypted Machine. https://www.youtube.com/watch?v=dD9rArKzQtg
– Edwards, B., Locasto, M., & Epstein, J. (2014, September). Panel Summary: The Future of Software Regulation. In Proceedings of the 2014 workshop on New Security Paradigms Workshop (pp. 117-126). ACM. https://www.researchgate.net/profile/Benjamin_Edwards2/publication/270452915_Panel_Summary_The_Future_of_Software_Regulation/links/54ab07290cf25c4c472f7230.pdf
– Jane Chong. Bad Code: The Whole Series. https://www.lawfareblog.com/bad-code-whole-series
– Dan Geer. Cybersecurity as Realpolitik. http://geer.tinho.net/geer.blackhat.6viii14.txt

Cyberwar

– Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown.
– Sean Kanuck, National Intelligence Officer at ODNI. Deterrence and Arms Control in Cyberspace. https://www.youtube.com/watch?v=N7VgvPB-3DU 
– de Matos Alves, A. (2015). Between the “Battlefield” Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict. Canadian Journal of Communication, 40(3).
– Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual space: cyber war, cyber terror, and risk. Space and culture, 15(2), 110-123.
– Thomas Rid and Ben Buchanan, “Attributing Cyber Attacks.” Journal of Strategic Studies, 2014. http://www.tandfonline.com/doi/full/10.1080/01402390.2014.977382?af=R
– Sean Lawson (2013). Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats, Journal of Information Technology & Politics, 10(1), 86-103. 

Cyberpathogens, or, 0-days

– Eric King, Witness Statement on Government Hacking: PRIVACY INTERNATIONAL v GOVERNMENT COMMUNICATION HEADQUARTERS. https://www.privacyinternational.org/sites/default/files/Witness_Statement_Of_Eric_King.pdf
– Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Simon and Schuster.
– Bill Robinson, CSEC and the Heartbleed Bug.http://luxexumbra.blogspot.ca/2014/04/csec-and-heartbleed-bug.html
– Herzog, M., & Schmid, J. (2016). 6 Who pays for zero-days?. Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, 95
– Bellovin, S. M., Blaze, M., Clark, S., & Landau, S. (2014). Lawful hacking: Using existing vulnerabilities for wiretapping on the Internet. Nw. J. Tech. & Intell. Prop., 12, i. http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1209&context=njtip 
– Fidler, M.(2014). Anarchy or regulation: controlling the global trade in zero-day vulnerabilities (Doctoral dissertation, Master Thesis. Stanford University, URL: https://d1x4j6omi7lpzs.cloudfront.net/live/wp-content/uploads/2014/06/Fidler-Zero-Day-Vulnerability-Thesis.pdf)

Hackers & Security

– Rogaway, P. (2015). The moral character of cryptographic work. URl: http://web.cs.ucdavis.edu/~rogaway/papers/moral.pdf
– Slayton, R. (2003). Speaking as scientists: Computer professionals in the Star Wars debate. History and technology, 19(4), 335-364.
– Gabriella Coleman (2016). How Anonymous Narrowly Evaded Being Framed as Cyberterrorists. HOPE. http://livestream.com/internetsociety/hopeconf/videos/130645379
– Nicolas Auray and Danielle Kaminsky, “The professionalisation paths of hackers in IT security: The sociology of a divided identity.” Annales Des Télécommunications, November 2007.
– Schulte, S. R. (2008). “The WarGames Scenario”: Regulating Teenagers and Teenaged Technology (1980-1984). Television & New Media.
– Benoît Dupont et al., “The ecology of trust among hackers.” Global Crime, 2016. http://www.tandfonline.com/doi/abs/10.1080/17440572.2016.1157480?journalCode=fglc20

Critical Infrastructure

– Brian Larkin, “The Politics and Poetics of Infrastructure.” Annual Review of Anthropology, October 2013. http://www.annualreviews.org/doi/abs/10.1146/annurev-anthro-092412-155522
– Stevens, T. (2015). Cyber Security and the Politics of Time. Cambridge University Press.
– Aradau, C. (2010). Security that matters: Critical infrastructure and objects of protection. Security Dialogue, 41(5), 491-514.
– Star, Susan Leigh, and Geoffrey C. Bowker. “How to Infrastructure.” In Handbook of New Media: Social Shaping and Social Consequences of Icts, edited by Leah A. Lievrouw and Sonia Livingstone, 151–62. London: Sage, 2002.

Theatre 

– Mann, Charles C. “Smoke Screening.” Vanity Fair (Dec 20, 2011). 
– Caduff, C. (2015). The Pandemic Perhaps: Dramatic Events in a Public Culture of Danger. Univ of California Press.
– Ron Deibert. The Cybersecurity Syndrome https://www.opencanada.org/features/the-cyber-security-syndrome/
– United States Central Intelligence Agency. 1944. Simple Sabotage Field Manual.
– Masco, J. (2014). The Theater of Operations: National Security Affect from the Cold War to the War on Terror. Duke University Press.
– Schneier, Bruce. “In Praise of Security Theater.” Wired (Jan 25, 2007). 
– Molotch, Harvey. 2012. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. Chapters 1, 4.

Alternative visions

– Roland Paris, 2001. “Human Security: Paradigm Shift or Hot Air?” International Security 26(2) Fall 2001 p. 87-102.
– Forcese, Craig, Canada’s Security & Intelligence Community after 9/11: Key Challenges and Conundrums (September 15, 2016). Available at SSRN: http://ssrn.com/abstract=2839622
– Hall, P., Heath, C., & Coles-Kemp, L. (2015). Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity, 1(1), 93-108.
– Mark Neufeld, 2004. “Pitfalls of Emancipation and Discourses of Security: Reflections on Canada’s ‘Security with a Human Face’” International Relations 18(1), 109-123. 
– Deibert, R. (2013). Divide and Rule: Republican Security Theory as Civil Society Cyber Strategy. Georgetown Journal of International Affairs, 39-50.
– Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20(3), 701-715.
– Deibert, R. (2012). Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace. Journal of military and strategic studies, 14(2).
18-10-2016

Inspiration

tor_lightning
30 June 2016

We have wandered around, both offline and on the Internet, in search of inspiration for the Crypto Design Challenge 2016. On this page we share our findings with you, to feed your inspiration to become a Deep Web Designer.

Read more

Cryptography in Art

002_random_darknet_shopper_KH_st_gallen_2014_10_905
24 March 2015

The following artworks all use cryptography or steganography as an essential part in their artworks and in one way inform or question issues surrounding privacy, surveillance and cryptography.

Read more

Background Articles

BluetoothBril1600
18 March 2015

Are you interested in reading more about privacy, encryption and the Deep Web? We found some articles that you might find interesting, so we wanted to share those with you.

Read more

Documentaries and Videos

19 February 2015

The following documentaries and videos outline the issues surrounding privacy and surveillance. We recommend watching one, if not all, of these documentaries to get a grip on privacy issues and why good cryptography is urgently needed.

Read more