Stephen Baker: The Numerati (2008)
Filed under book | Tags: · advertising, algorithm, blogging, computing, data, data mining, internet, mathematics, privacy, psychology, social media, surveillance, technology

An urgent look at how a global math elite is predicting and altering our behavior — at work, at the mall, and in bed.
Every day we produce loads of data about ourselves simply by living in the modern world: we click web pages, flip channels, drive through automatic toll booths, shop with credit cards, and make cell phone calls. Now, in one of the greatest undertakings of the twenty-first century, a savvy group of mathematicians and computer scientists is beginning to sift through this data to dissect us and map out our next steps. Their goal? To manipulate our behavior — what we buy, how we vote — without our even realizing it.
In this tour de force of original reporting and analysis, journalist Stephen Baker provides us with a fascinating guide to the world we’re all entering — and to the people controlling that world. The Numerati have infiltrated every realm of human affairs, profiling us as workers, shoppers, patients, voters, potential terrorists — and lovers. The implications are vast. Our privacy evaporates. Our bosses can monitor and measure our every move (then reward or punish us). Politicians can find the swing voters among us, by plunking us all into new political groupings with names like “Hearth Keepers” and “Crossing Guards.” It can sound scary. But the Numerati can also work on our behalf, diagnosing an illness before we’re aware of the symptoms, or even helping us find our soul mate. Surprising, enlightening, and deeply relevant, The Numerati shows how a powerful new endeavor — the mathematical modeling of humanity — will transform every aspect of our lives.
Publisher Mariner Books, Boston/New York, 2008
ISBN 0618784608, 9780618784608
256 pages
review (Marcus du Sautoy, The Guardian)
review (Rob Walker, The New York Times)
review (Tim Walker, The Independent)
Stephen Graham: Cities Under Siege: The New Military Urbanism (2010)
Filed under book | Tags: · city, iraq, israel, military, neoliberalism, security, surveillance, technology, terrorism, urbanism, war

A powerful exposé of how political violence operates through the spaces of urban life.
Cities are the new battleground of our increasingly urban world. From the slums of the global South to the wealthy financial centers of the West, Cities Under Siege traces the spread of political violence through the sites, spaces, infrastructure and symbols of the world’s rapidly expanding metropolitan areas.
Drawing on a wealth of original research, Stephen Graham shows how Western militaries and security forces now perceive all urban terrain as a conflict zone inhabited by lurking shadow enemies. Urban inhabitants have become targets that need to be continually tracked, scanned and controlled. Graham examines the transformation of Western armies into high-tech urban counter-insurgency forces. He looks at the militarization and surveillance of international borders, the use of ‘security’ concerns to suppress democratic dissent, and the enacting of legislation to suspend civilian law. In doing so, he reveals how the New Military Urbanism permeates the entire fabric of urban life, from subway and transport networks hardwired with high-tech ‘command and control’ systems to the insidious militarization of a popular culture corrupted by the all-pervasive discourse of ‘terrorism.’
Publisher Verso Books, London, 2010
ISBN 1844678369, 9781844678365
432 pages
review (Nicholas Lezard, The Guardian)
review (Jeff Heydon, review31)
review (George Steinmetz)
review (Alice O’Connor)
review (Jennifer Light)
The CryptoParty Handbook (2012)
Filed under handbook, sprint book | Tags: · anonymity, cryptography, email, encryption, floss, hacking, internet, open source, privacy, security, software, surveillance, technology, web

This handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties.
Facilitated by Adam Hyde
Core Team: Marta Peirano, Asher Wolf, Julian Oliver, Danja Vasiliev, Malte Dik, Brendan Howell, Jan Gerber, Brian Newbold,
Assisted by Teresa Dillon, AT, Carola Hesse, Chris Pinchen, ‘LiamO’, ‘l3lackEyedAngels’, ‘Story89’, Travis Tueffel
Creative Commons BY-SA 4.0 Unported license
386+ pages
via Julian Oliver
discussion and criticism (Liberationtech list)
Download the latest edition
Contribute (via GitHub)
Contribute (via Booki)