It’s not just computers―hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author B
4,422 439 3MB
English Pages 304 Year 2023
Table of contents :
Introduction
PART 1: HACKING 101
1.What Is Hacking?
2.Hacking Systems
3.What Is a System?
4.The Hacking Life Cycle
5.The Ubiquity of Hacking
PART 2: BASIC HACKS AND DEFENSES
6.ATM Hacks
7.Casino Hacks
8.Airline Frequent-Flier Hacks
9.Sports Hacks
10.Hacks Are Parasitical
11.Defending against Hacks
12.More Subtle Hacking Defenses
13.Removing Potential Hacks in the Design Phase
14.The Economics of Defense
15.Resilience
PART 3: HACKING FINANCIAL SYSTEMS
16.Hacking Heaven
17.Hacking Banking
18.Hacking Financial Exchanges
19.Hacking Computerized Financial Exchanges
20.Luxury Real Estate
21.Societal Hacks Are Often Normalized
22.Hacking the Market
23.“Too Big to Fail”
24.Venture Capital and Private Equity
25.Hacking and Wealth
PART 4: HACKING LEGAL SYSTEMS
26.Hacking Laws
27.Legal Loopholes
28.Hacking Bureaucracy
29.Hacking and Power
30.Undermining Regulations
31.Jurisdictional Interactions
32.Administrative Burdens
33.Hacking Common Law
34.Hacking as Evolution
PART 5: HACKING POLITICAL SYSTEMS
35.Hidden Provisions in Legislation
36.Must-Pass Legislation
37.Delegating and Delaying Legislation
38.The Context of a Hack
39.Hacking Voting Eligibility
40.Other Election Hacks
41.Money in Politics
42.Hacking to Destruction
PART 6: HACKING COGNITIVE SYSTEMS
43.Cognitive Hacks
44.Attention and Addiction
45.Persuasion
46.Trust and Authority
47.Fear and Risk
48.Defending against Cognitive Hacks
49.A Hierarchy of Hacking
PART 7: HACKING AI SYSTEMS
50.Artificial Intelligence and Robotics
51.Hacking AI
52.The Explainability Problem
53.Humanizing AI
54.AI and Robots Hacking Us
55.Computers and AI Are Accelerating Societal Hacking
56.When AIs Become Hackers
57.Reward Hacking
58.Defending against AI Hackers
59.A Future of AI Hackers
60.Governance Systems for Hacking
Concluding Thoughts
Acknowledgments
Notes
Index