A hacker's mind How the powerful bend society's rules, and how to bend them back

Bruce Schneier, 1963-

Book - 2023

It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.

Saved in:

2nd Floor Show me where

303.4834/Schneier
1 / 1 copies available
Location Call Number   Status
2nd Floor 303.4834/Schneier Checked In
Subjects
Published
New York : W.W. Norton and Company [2023]
Language
English
Main Author
Bruce Schneier, 1963- (author)
Edition
First edition
Physical Description
284 pages ; 24 cm
Bibliography
Includes bibliographical references (pages 255-276) and index.
ISBN
9780393866667
  • Introduction
  • Part 1. Hacking 101
  • 1. What Is Hacking?
  • 2. Hacking Systems
  • 3. What is a System?
  • 4. The Hacking Life Cycle
  • 5. The Ubiquity of Hacking
  • Part 2. Basic Hacks and Defenses
  • 6. ATM Hacks
  • 7. Casino Hacks
  • 8. Airline Frequent-Flier Hacks
  • 9. Sports Hacks
  • 10. Hacks Are Parasitical
  • 11. Defending against Hacks
  • 12. More Subtle Hacking Defenses
  • 13. Removing Potential Hacks in the Design Phase
  • 14. The Economics of Defense
  • 15. Resilience
  • Part 3. Hacking Financial Systems
  • 16. Hacking Heaven
  • 17. Hacking Banking
  • 18. Hacking Financial Exchanges
  • 19. Hacking Computerized Financial Exchanges
  • 20. Luxury Real Estate
  • 21. Societal Hacks Are Often Normalized
  • 22. Hacking the Market
  • 23. "Too Big to Fail"
  • 24. Venture Capital and Private Equity
  • 25. Hacking and Wealth
  • Part 4. Hacking Legal Systems
  • 26. Hacking Laws
  • 27. Legal Loopholes
  • 28. Hacking Bureaucracy
  • 29. Hacking and Power
  • 30. Undermining Regulations
  • 31. Jurisdictional Interactions
  • 32. Administrative Burdens
  • 33. Hacking Common Law
  • 34. Hacking as Evolution
  • Part 5. Hacking Political Systems
  • 35. Hidden Provisions in Legislation
  • 36. Must-Pass Legislation
  • 37. Delegating and Delaying Legislation
  • 38. The Context of a Hack
  • 39. Hacking Voting Eligibility
  • 40. Other Election Hacks
  • 41. Money in Politics
  • 42. Hacking to Destruction
  • Part 6. Hacking Cognitive Systems
  • 43. Cognitive Hacks
  • 44. Attention and Addiction
  • 45. Persuasion
  • 46. Trust and Authority
  • 47. Fear and Risk
  • 48. Defending against Cognitive Hacks
  • 49. A Hierarchy of Hacking
  • Part 7. Hacking at Systems
  • 50. Artificial Intelligence and Robotics
  • 51. Hacking Al
  • 52. The Explainability Problem
  • 53. Humanizing Al
  • 54. Al and Robots Hacking Us
  • 55. Computers and Al Are Accelerating Societal Hacking
  • 56. When Als Become Hackers
  • 57. Reward Hacking
  • 58. Defending against AI Hackers
  • 59. A Future of Al Hackers
  • 60. Governance Systems for Hacking
  • Concluding Thoughts
  • Acknowledgments
  • Notes
  • Index
Review by Booklist Review

Author and public-interest security technologist Schneier (Data and Goliath, 2015) defines a "hack" as an activity allowed by a system "that subverts the rules or norms of the system . . . at the expense of someone else affected by the system." In accessing the security of a particular system, technologists such as Schneier look at how it might fail. In order to counter a hack, it becomes necessary to think like a hacker. Schneier lays out the ramifications of a variety of hacks, contrasting the hacking of the tax code to benefit the wealthy with hacks in realms such as sports that can innovate and change a game for the better. The key to dealing with hacks is being proactive and providing adequate patches to fix any vulnerabilities. Schneier's fascinating work illustrates how susceptible many systems are to being hacked and how lives can be altered by these subversions. Schneier's deep dive into this cross-section of technology and humanity makes for investigative gold.

From Booklist, Copyright (c) American Library Association. Used with permission.
Review by Publisher's Weekly Review

"Hacking is something that the rich and powerful do, something that reinforces existing power structures," contends security technologist Schneier (Click Here to Kill Everybody) in this excellent survey of exploitation. Taking a broad understanding of hacking as an "activity allowed by the system that subverts the... system," Schneier draws on his background analyzing weaknesses in cybersecurity to examine how those with power take advantage of financial, legal, political, and cognitive systems. He decries how venture capitalists "hack" market dynamics by subverting the pressures of supply and demand, noting that venture capital has kept Uber afloat despite the company having not yet turned a profit. Legal loopholes constitute another form of hacking, Schneier suggests, discussing how the inability of tribal courts to try non-Native individuals means that many sexual assaults of Native American women go unprosecuted because they were committed by non--Native American men. Schneier outlines strategies used by corporations to capitalize on neural processes and "hack... our attention circuits," pointing out how Facebook's algorithms boost content that outrages users because doing so increases engagement. Elegantly probing the mechanics of exploitation, Schneier makes a persuasive case that "we need society's rules and laws to be as patchable as your computer." With lessons that extend far beyond the tech world, this has much to offer. (Feb.)

(c) Copyright PWxyz, LLC. All rights reserved
Review by Kirkus Book Review

A cybersecurity expert examines how the powerful game whatever system is put before them, leaving it to others to cover the cost. Schneier, a professor at Harvard Kennedy School and author of such books as Data and Goliath and Click Here To Kill Everybody, regularly challenges his students to write down the first 100 digits of pi, a nearly impossible task--but not if they cheat, concerning which he admonishes, "Don't get caught." Not getting caught is the aim of the hackers who exploit the vulnerabilities of systems of all kinds. Consider right-wing venture capitalist Peter Thiel, who located a hack in the tax code: "Because he was one of the founders of PayPal, he was able to use a $2,000 investment to buy 1.7 million shares of the company at $0.001 per share, turning it into $5 billion--all forever tax free." It was perfectly legal--and even if it weren't, the wealthy usually go unpunished. The author, a fluid writer and tech communicator, reveals how the tax code lends itself to hacking, as when tech companies like Apple and Google avoid paying billions of dollars by transferring profits out of the U.S. to corporate-friendly nations such as Ireland, then offshoring the "disappeared" dollars to Bermuda, the Caymans, and other havens. Every system contains trap doors that can be breached to advantage. For example, Schneier cites "the Pudding Guy," who hacked an airline miles program by buying low-cost pudding cups in a promotion that, for $3,150, netted him 1.2 million miles and "lifetime Gold frequent flier status." Since it was all within the letter if not the spirit of the offer, "the company paid up." The companies often do, because they're gaming systems themselves. "Any rule can be hacked," notes the author, be it a religious dietary restriction or a legislative procedure. With technology, "we can hack more, faster, better," requiring diligent monitoring and a demand that everyone play by rules that have been hardened against tampering. An eye-opening, maddening book that offers hope for leveling a badly tilted playing field. Copyright (c) Kirkus Reviews, used with permission.

Copyright (c) Kirkus Reviews, used with permission.