A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back [1 ed.] 0393866661, 9780393866667, 9780393866674, 1836913367, 9781349172955, 6439594002, 9780691173429, 2019121801

It’s not just computers―hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author B

4,422 439 3MB

English Pages 304 Year 2023

Report DMCA / Copyright

DOWNLOAD FILE

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back [1 ed.]
 0393866661, 9780393866667, 9780393866674, 1836913367, 9781349172955, 6439594002, 9780691173429, 2019121801

Table of contents :
Introduction

PART 1: HACKING 101

1.What Is Hacking?

2.Hacking Systems

3.What Is a System?

4.The Hacking Life Cycle

5.The Ubiquity of Hacking

PART 2: BASIC HACKS AND DEFENSES

6.ATM Hacks

7.Casino Hacks

8.Airline Frequent-Flier Hacks

9.Sports Hacks

10.Hacks Are Parasitical

11.Defending against Hacks

12.More Subtle Hacking Defenses

13.Removing Potential Hacks in the Design Phase

14.The Economics of Defense

15.Resilience

PART 3: HACKING FINANCIAL SYSTEMS

16.Hacking Heaven

17.Hacking Banking

18.Hacking Financial Exchanges

19.Hacking Computerized Financial Exchanges

20.Luxury Real Estate

21.Societal Hacks Are Often Normalized

22.Hacking the Market

23.“Too Big to Fail”

24.Venture Capital and Private Equity

25.Hacking and Wealth

PART 4: HACKING LEGAL SYSTEMS

26.Hacking Laws

27.Legal Loopholes

28.Hacking Bureaucracy

29.Hacking and Power

30.Undermining Regulations

31.Jurisdictional Interactions

32.Administrative Burdens

33.Hacking Common Law

34.Hacking as Evolution

PART 5: HACKING POLITICAL SYSTEMS

35.Hidden Provisions in Legislation

36.Must-Pass Legislation

37.Delegating and Delaying Legislation

38.The Context of a Hack

39.Hacking Voting Eligibility

40.Other Election Hacks

41.Money in Politics

42.Hacking to Destruction

PART 6: HACKING COGNITIVE SYSTEMS

43.Cognitive Hacks

44.Attention and Addiction

45.Persuasion

46.Trust and Authority

47.Fear and Risk

48.Defending against Cognitive Hacks

49.A Hierarchy of Hacking

PART 7: HACKING AI SYSTEMS

50.Artificial Intelligence and Robotics

51.Hacking AI

52.The Explainability Problem

53.Humanizing AI

54.AI and Robots Hacking Us

55.Computers and AI Are Accelerating Societal Hacking

56.When AIs Become Hackers

57.Reward Hacking

58.Defending against AI Hackers

59.A Future of AI Hackers

60.Governance Systems for Hacking

Concluding Thoughts

Acknowledgments

Notes

Index

Polecaj historie