READINGS 

 

 

 

INAF 6382 TECHNOLOGY, NATIONAL SECURITY & THE CITIZEN

Class #1 | Course overview 

Class #2 | The national security landscape 

George, R. & Rishikof, H. (2011). The national security enterprise: navigating the labyrinth.

- Pgs. 1-8 “The national security enterprise: institutions, cultures, and politics”

- Pgs 9 – 27 “History of the interagency process for foreign relations in the US”

- Pgs. 267-333 “Section III: The outside players”

Wichowski, A (2017) "Introduction." The Information Trade

[ PDF ]

[ TOP ] 

Class #3 | Categories of national security technologies (pt 1)

Goodman, M. (2014). Future crimes: everything is connected, everyone is vulnerable and what you can do about it. Pgs. 65-80 "The surveillance economy."

[ PDF

EPIC Domestic Surveillance Project (browse website)

[ LINK

[ TOP ] 

Class #4 | Categories of national security technologies (pt 2)

National Research Council (March 26, 2014). Emerging and readily available technologies and national security: a framework for addressing ethical, legal, and societal issues. Pgs 15-114 "Framing the issues," "Foundational technologies," and "Application domains"

[ PDF 1 , PDF 2 , PDF 3

DARPA (2017) "Changing how we win. DARPA technologies that are making a difference today." 

[ PDF

[ TOP ]

Class #5 | Governments use of tools

Navarria, G. (2014). “Can democracy survive the rise of of tools democratic, autocratic surveillance technology?” Democratic Theory, Volume 1, 02.25.16 governments use of Number 2, pgs. 78-84

[ PDF ]

Castells, M. (2012). Networks of outrage & hope: social infrastructure and movements in the internet age.” Pgs 1-19 “Networking defense technologies minds, creating meaning, contesting power”; Pgs 246-262, “Changing the world in a network society”

[ PDF ]

[ TOP ]

Class #6 | Citizens & social movements use of tools

Coleman, G. (2014) Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. “And now you have got our tools movements use of attention,” “Project Chanology - I came for the lulz but stayed for the outrage.”

[ PDF ]

Wichowski, "Secrecy is for losers: how diplomats can protect national security by embracing openness" 

[ PDF ]

[ TOP ]

Class #7 | Non-state & net-state use of tools

Beebe, S. & Kaldor, M. (2010). The ultimate weapon is no weapon: human security and the new rules of war and peace. Pgs. 19-50, “The Twenty-first century risks” and “The financial entity use of twentieth-century mindset.”

[ PDF ]

Fussell (2017) "One Mission: How leaders build a team of teams," pg 25-61, pg 76-108

Malcomson (2016). "Splinternet: how geopolitics and commerce are fragmenting the world wide web," Chapter 3

Class #8 | Foreign policy influence & imbalance

Guardian (2017) "It's digital colonialism: how Facebook's free internet service has failed its users"

[ LINK

NYTimes (2017) "As US confronts Internet's disruptions, China feels vindicated"

[ LINK

McAllistair, White. (2013) "Did Russia (Nearly) have a Facebook Revolution in 2011? Social Media's Challenge to Authoritarianism" Politics

[ LINK

Class #9 | Emerging forms of power

Nye, J. (2011). The future of power. Pgs. 3-24 “What is power in global affairs”?

[ PDF ]

Galbraith, J. "The anatomy of power," p 1-13, p38-71

*This book can be found on Reserves in Lehman 

Shirky (2011) "The political power of social media," Foreign Affairs

[ LINK ]

Class #10 | Impact & implications

TBD