If you’re interested in cybersecurity, Aaron Gluck Thaler, a student of Gabriella Coleman, has created a fantastic reading list. So I you have some time, and you like reading this is how you can spend it:
What is Critical? What is Security?
– Columba Peoples and Nick Vaughan‐Williams, Critical Security Studies: An Introduction (New York:
Routledge, 2010): 1‐88.
– “The Increasing insecurity of security studies: Conceptualizing security in the last twenty years,” Contemporary Security Policy, 20(3): 72-101.
– Mark Neocleous and George Rigakos, ‘Anti‐Security: A Declaration’, in Mark Neocleous and George Rigakos, eds., Anti‐Security (Ottawa: Red Quill Books, 2011): 15‐21.
– Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.
Schools in Critical Security Studies
– Ole Waever, ‘Aberystwyth, Paris, Copenhagen: the Europeanness of new “schools” of security theory in an American field’, in Arlene B. Tickner and David L. Blaney, eds., Thinking International Relations Differently (New York: Routledge, 2012): 48‐71.
– Mark B. Salter and Miguel de Larrinaga, ‘Cold Case: A Manifesto for Canadian Critical Security Studies’, Critical Studies on Security 2:1 (2014).
– Hansen, Lene. (2000) The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School. Millenium 29:285-306.
– Nik Hynek and David Chandler, ‘No emancipatory alternative, no critical security studies’, Critical Studies on Security 1:1 (2013): 46‐63.
– Arnold Wolfers, 1952. “National Security as an Ambiguous Symbol” Political Science Quarterly 23.
– Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161.
– Forcese, Craig and Roach, Kent, Introduction (False Security: The Radicalization of Canadian Anti-Terrorism) (September 3, 2015). False Security: The Radicalization of Canadian Anti-terrorism, Forthcoming. Available at SSRN: http://ssrn.com/abstract=2655781
– Michels, R. (1915). The Iron Law of Oligarchy, in Political parties: A sociological study of the oligarchical tendencies of modern democracy. Hearst’s International Library Company.
– Weber, M. (1968). The types of legitimate domination.
– Savage, C. (2015). Power Wars: Inside Obama’s Post-9/11 Presidency. New York: Little Brown and Company.
– Tilly, C. (1985). War making and state making as organized crime. Violence: A reader.
Surveillance or Security?
– Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., … & Rivest, R. L. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, tyv009. https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf
– Landau, S. (2011). Surveillance or security?: The risks posed by new wiretapping technologies. Mit Press.
– Jeanne Theoharis. “I FEEL LIKE A DESPISED INSECT”: COMING OF AGE UNDER SURVEILLANCE IN NEW YORK
– Report: Impacts of surveillance on contemporary British activism
– Cyril, Malkia. “Black Americans and Encryption: The Stakes are Higher than Apple v. FBI.” The Guardian (Mar 21, 2016).
– Waddell, Kaveh. “Encryption is a Luxury.” The Atlantic (Mar 28, 2016).
– Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown.
– de Matos Alves, A. (2015). Between the “Battlefield” Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict. Canadian Journal of Communication, 40(3).
– Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual space: cyber war, cyber terror, and risk. Space and culture, 15(2), 110-123.
– Sean Lawson (2013). Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats, Journal of Information Technology & Politics, 10(1), 86-103.
Cyberpathogens, or, 0-days
– Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Simon and Schuster.
– Herzog, M., & Schmid, J. (2016). 6 Who pays for zero-days?. Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, 95
Hackers & Security
– Slayton, R. (2003). Speaking as scientists: Computer professionals in the Star Wars debate. History and technology, 19(4), 335-364.
– Nicolas Auray and Danielle Kaminsky, “The professionalisation paths of hackers in IT security: The sociology of a divided identity.” Annales Des Télécommunications, November 2007.
– Schulte, S. R. (2008). “The WarGames Scenario”: Regulating Teenagers and Teenaged Technology (1980-1984). Television & New Media.
– Stevens, T. (2015). Cyber Security and the Politics of Time. Cambridge University Press.
– Aradau, C. (2010). Security that matters: Critical infrastructure and objects of protection. Security Dialogue, 41(5), 491-514.
– Star, Susan Leigh, and Geoffrey C. Bowker. “How to Infrastructure.” In Handbook of New Media: Social Shaping and Social Consequences of Icts, edited by Leah A. Lievrouw and Sonia Livingstone, 151–62. London: Sage, 2002.
– Mann, Charles C. “Smoke Screening.” Vanity Fair (Dec 20, 2011).
– Caduff, C. (2015). The Pandemic Perhaps: Dramatic Events in a Public Culture of Danger. Univ of California Press.
– United States Central Intelligence Agency. 1944. Simple Sabotage Field Manual.
– Masco, J. (2014). The Theater of Operations: National Security Affect from the Cold War to the War on Terror. Duke University Press.
– Schneier, Bruce. “In Praise of Security Theater.” Wired (Jan 25, 2007).
– Molotch, Harvey. 2012. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. Chapters 1, 4.
– Roland Paris, 2001. “Human Security: Paradigm Shift or Hot Air?” International Security 26(2) Fall 2001 p. 87-102.
– Forcese, Craig, Canada’s Security & Intelligence Community after 9/11: Key Challenges and Conundrums (September 15, 2016). Available at SSRN: http://ssrn.com/abstract=2839622
– Hall, P., Heath, C., & Coles-Kemp, L. (2015). Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity, 1(1), 93-108.
– Mark Neufeld, 2004. “Pitfalls of Emancipation and Discourses of Security: Reflections on Canada’s ‘Security with a Human Face’” International Relations 18(1), 109-123.
– Deibert, R. (2013). Divide and Rule: Republican Security Theory as Civil Society Cyber Strategy. Georgetown Journal of International Affairs, 39-50.
– Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20(3), 701-715.
– Deibert, R. (2012). Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace. Journal of military and strategic studies, 14(2).