AWICHOWSKI
READINGS
INAF 6382 TECHNOLOGY, NATIONAL SECURITY & THE CITIZEN
Class #1 | Course overview
Class #2 | The national security landscape
George, R. & Rishikof, H. (2011). The national security enterprise: navigating the labyrinth.
- Pgs. 1-8 “The national security enterprise: institutions, cultures, and politics”
- Pgs 9 – 27 “History of the interagency process for foreign relations in the US”
- Pgs. 267-333 “Section III: The outside players”
Wichowski, A (2017) "Introduction." The Information Trade
[ PDF ]
[ TOP ]
Class #3 | Categories of national security technologies (pt 1)
Goodman, M. (2014). Future crimes: everything is connected, everyone is vulnerable and what you can do about it. Pgs. 65-80 "The surveillance economy."
[ PDF ]
EPIC Domestic Surveillance Project (browse website)
[ LINK ]
[ TOP ]
Class #4 | Categories of national security technologies (pt 2)
National Research Council (March 26, 2014). Emerging and readily available technologies and national security: a framework for addressing ethical, legal, and societal issues. Pgs 15-114 "Framing the issues," "Foundational technologies," and "Application domains"
DARPA (2017) "Changing how we win. DARPA technologies that are making a difference today."
[ PDF ]
[ TOP ]
Class #5 | Governments use of tools
Navarria, G. (2014). “Can democracy survive the rise of of tools democratic, autocratic surveillance technology?” Democratic Theory, Volume 1, 02.25.16 governments use of Number 2, pgs. 78-84
[ PDF ]
Castells, M. (2012). Networks of outrage & hope: social infrastructure and movements in the internet age.” Pgs 1-19 “Networking defense technologies minds, creating meaning, contesting power”; Pgs 246-262, “Changing the world in a network society”
[ PDF ]
[ TOP ]
Class #6 | Citizens & social movements use of tools
Coleman, G. (2014) Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. “And now you have got our tools movements use of attention,” “Project Chanology - I came for the lulz but stayed for the outrage.”
[ PDF ]
Wichowski, "Secrecy is for losers: how diplomats can protect national security by embracing openness"
[ PDF ]
[ TOP ]
Class #7 | Non-state & net-state use of tools
Beebe, S. & Kaldor, M. (2010). The ultimate weapon is no weapon: human security and the new rules of war and peace. Pgs. 19-50, “The Twenty-first century risks” and “The financial entity use of twentieth-century mindset.”
[ PDF ]
Fussell (2017) "One Mission: How leaders build a team of teams," pg 25-61, pg 76-108
Malcomson (2016). "Splinternet: how geopolitics and commerce are fragmenting the world wide web," Chapter 3
Class #8 | Foreign policy influence & imbalance
Guardian (2017) "It's digital colonialism: how Facebook's free internet service has failed its users"
[ LINK ]
NYTimes (2017) "As US confronts Internet's disruptions, China feels vindicated"
[ LINK ]
McAllistair, White. (2013) "Did Russia (Nearly) have a Facebook Revolution in 2011? Social Media's Challenge to Authoritarianism" Politics
[ LINK ]
Class #9 | Emerging forms of power
Nye, J. (2011). The future of power. Pgs. 3-24 “What is power in global affairs”?
[ PDF ]
Galbraith, J. "The anatomy of power," p 1-13, p38-71
*This book can be found on Reserves in Lehman
Shirky (2011) "The political power of social media," Foreign Affairs
[ LINK ]
Class #10 | Impact & implications
Winner, L. (1980). "Do artifacts have politics?" Daedelus
[ LINK ]
Harari, Y. (2018 ). "Why technology favors tyranny," The Atlantic
[ LINK ]
Schaake, M. (2020). "How democracies can claim back power in the digital world." MIT Technology Review
[ LINK ]