Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
How to Rig an Election
Election fraud in the United States in the era of computerized voting machines controlled and programmed by far-right corporate executives.
Stuxnet on the Loose: Security for the One Percent
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
US: Offensive Cyber-Warfare is Illegal... Unless We Do It
The US government declares that cyberwarfare directed against the US would be an act of war -- and, oh, by the way, that it is agressively engaged in cyberwarfare against foreign countries.
Campus Activism Against NSA Spying is Growing Fast
EFF has been on the road, traveling to cities and towns across the country to bring our message of digital rights and reform to community and student groups. And while we had the tremendous opportunit...
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.