Applying the Rational Choice Perspective to the Hacking Underground

Total Page:16

File Type:pdf, Size:1020Kb

Applying the Rational Choice Perspective to the Hacking Underground University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2008 What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground Michael Bachmann University of Central Florida Part of the Sociology Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Bachmann, Michael, "What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground" (2008). Electronic Theses and Dissertations, 2004-2019. 3790. https://stars.library.ucf.edu/etd/3790 WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND by MICHAEL BACHMANN M.A. University of Mannheim, 2004 A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Sociology in the College of Sciences at the University of Central Florida Orlando, Florida Summer Term 2008 Major Professor: Jay Corzine ABSTRACT The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and oth- er types of cyber-criminals has been growing significantly in the last decade, main- stream criminology has only recently begun to realize the significance of this threat. Cy- ber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber- criminology currently also suffers from the scarcity of available data. As a result, scien- tific answers to crucial questions, such as who exactly the attackers are and why they engage in hacking activities, remain largely fragmentary. The present study begins to fill this remaining gap in the literature. It examines survey data about hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking con- vention in Washington D.C. in February 2008. The theoretical framework guiding the analyses is the rational choice perspective (Clarke & Cornish, 1985). Several hypothes- es about hackers are derived from the theory and some of its models are transposed into the context of hackers. Results suggest that the rational choice perspective is a vi- able theory when applied to cyber-criminals. Findings also demonstrate that the creation of more effective countermeasures requires adjustments to our understanding of who hackers really are and why they hack. ii To my wife and family, who of all that walk the earth, are most precious to me and whose continuing support and love enabled me to write this dissertation. iii ACKNOWLEDGMENTS I would like to deeply thank some of the persons who, during the several months of this endeavor, provided me with the necessary support and helpful assistance. With- out their care and consideration, this dissertation would not have matured in the same way. In particular, I would like to thank the members of my dissertation committee for their encouragement, guidance, and their feedback during all phases of this project. One of my wisest decisions as student was to select Dr. Jay Corzine as my dissertation chair. He was an excellent and committed supervisor of this project, and he also proved to be an invaluable help during my job search. I would further like to thank him as well as Dr. Jana Jasinski and Dr. James Wright (in alphabetical order) for providing me with the opportunity to even become a Ph.D. student at University of Central Florida, and to do so at a unique moment in time—during the start of a new program. All of them pro- vided me with an excellent education that significantly altered my life-course trajectory and turned me into the person I am today. I would further like to extend my gratitude to my external committee member Dr. John Jarvis, whose contacts and expertise were ex- ceptionally helpful for this project. Second, I would like to especially thank my colleague Dr. Monica Mendez for her offer to review and edit my drafts. Without her nuanced understanding of English lan- guage, this dissertation would not have been written in the same way. I cherish the time we spent together and hope we will be able to stay in touch despite the large distance that will be between us. iv TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................ viii LIST OF TABLES ............................................................................................................ix LIST OF ACRONYMS/ABBREVIATIONS ....................................................................... x CHAPTER ONE: INTRODUCTION ................................................................................. 1 CHAPTER TWO: THE MEANINGS OF HACKING AND HACKERS.............................. 7 The Controversial Meanings of Hacker and Hacking ........................................ 7 The Etymological History of the Term Hacker ................................................... 9 The Current Controversy Over the Meaning of Hacker ................................... 12 The (Mis)representations of Hackers in the General Media ............................ 16 CHAPTER THREE: THE GROWING THREAT OF CYBERCRIME ............................. 24 The Co-Evolution of the Internet and Cybercrimes ......................................... 25 The Novelty of Cyber-Criminology .................................................................. 29 The Novelty of Cybercrime.............................................................................. 30 CHAPTER FOUR: THE CHALLENGES IN RESEARCHING CYBERCRIME .............. 35 Methodological Problems ................................................................................ 35 The Problem of Defining and Classifying Cybercrimes ............................... 35 The Problem of Measuring the Scale of Cybercrimes ................................. 38 Theoretical Problems ...................................................................................... 42 The Problem of Isolating Structural Correlates ............................................ 42 The Problem of Isolating Offender Characteristics ...................................... 43 The Proposed Theoretical Approach .............................................................. 45 v CHAPTER FIVE: THE RATIONAL CHOICE PERSPECTIVE ...................................... 48 The Six Basic Propositions of the Rational Choice Perspective...................... 49 The Rationality of Criminal Acts .................................................................. 50 The Limitations of Rationality in Decision Making Processes ...................... 51 The Importance of Situational Adjustments ................................................. 55 The Differences between Involvement and Event Decisions ....................... 57 The Three Different Stages of Involvement ................................................. 58 The Reconstruction of Crime Events as a Decision Sequence ................... 66 CHAPTER SIX: RESEARCH DESIGN .......................................................................... 69 The Difficulty of Sampling Hackers ................................................................. 70 The ShmooCon Convention ............................................................................ 75 The Pretest and IRB Approval ........................................................................ 79 The Data Collection Process ........................................................................... 82 CHAPTER SEVEN: THE SURVEY INSTRUMENT ....................................................... 85 The Measurements of General Hacking Activity ............................................. 87 The Measurements of Risk Propensity and Rationality ................................... 99 The Measurements of Sociodemographics ................................................... 101 CHAPTER EIGHT: METHODS AND RESULTS ......................................................... 103 The Sociodemographic Composition of the Sample ..................................... 103 The Descriptive Statistics of Continued Involvement .................................... 108 The Initiation Phase ................................................................................... 108 The Popularity of Different Hacking Methods ............................................ 114 The Prevalence and Success Rates of Different Kinds of Attack Methods 117 vi The Developments During the Habituation of Hacking .............................. 123 The Risk-Avoidance Efforts and Desistance Considerations..................... 129 The Assessment of Scale Validity and Reliability .......................................... 133 The Exploratory Factor Analysis ................................................................ 134 The Test of the Study Hypotheses ................................................................ 137 The Test of Hypotheses H1 and H2 .............................................................
Recommended publications
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • From Voodoo to Viruses: the Evolution of the Zombie in Twentieth Century Popular Culture
    From Voodoo to Viruses: The Evolution of the Zombie in Twentieth Century Popular Culture By Margaret Twohy Adviser: Dr. Bernice Murphy A thesis submitted in partial fulfilment of the Degree of Master’s of Philosophy in Popular Literature Trinity College Dublin Dublin, Ireland October 2008 2 Abstract The purpose of this thesis is to explore the evolutionary path the zombie has followed in 20th Century popular culture. Additionally, this thesis will examine the defining characteristics of the zombie as they have changed through its history. Over the course of the last century and edging into the 21st Century, the zombie has grown in popularity in film, videogames, and more recently in novels. The zombie genre has become a self-inspiring force in pop culture media today. Films inspired a number of videogames, which in turn, supplied the film industry with a resurgence of inspirations and ideas. Combined, these media have brought the zombie to a position of greater prominence in popular literature. Additionally, within the growing zombie culture today there is an over-arcing viral theme associated with the zombie. In many films, games, and novels there is a viral cause for a zombie outbreak. Meanwhile, the growing popularity of zombies and its widening reach throughout popular culture makes the genre somewhat viral-like as well. Filmmakers, authors and game designers are all gathering ideas from one another causing the some amount of self- cannibalisation within the genre. 3 Table of Contents Introduction 4 Chapter One 7 Evolution of the Dead Chapter Two 21 Contaminants, Viruses, and Possessions—Oh my! Chapter Three 34 Dawn of the (Digital) Dead Chapter Four 45 Rise of the Literary Zombie Conclusion 58 Bibliography 61 4 Introduction There are perhaps few, if any fictional monsters that can rival the versatility of the humble zombie (or zombi)1.
    [Show full text]
  • Risk Assessment and Knowledge Management of Ethical Hacking In
    Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society by Baha Abu-Shaqra A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electronic Business Faculty of Engineering University of Ottawa © Baha Abu-Shaqra, Ottawa, Canada, 2020 ii Abstract Cyber attacks by domestic and foreign threat actors are increasing in frequency and sophistication. Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening social and political stability. The use of open digital hacking technologies in ethical hacking in higher education and within broader society raises ethical, technical, social, and political challenges for liberal democracies. Programs teaching ethical hacking in higher education are steadily growing but there is a concern that teaching students hacking skills increases crime risk to society by drawing students toward criminal acts. A cybersecurity skill gap undermines the security/viability of business and government institutions. The thesis presents an examination of opportunities and risks involved in using AI powered intelligence gathering/surveillance technologies in ethical hacking teaching practices in Canada. Taking a qualitative exploratory case study approach, technoethical inquiry theory (Bunge-Luppicini) and Weick’s sensemaking model were applied as a sociotechnical theory
    [Show full text]
  • Deepfakes & Disinformation
    DEEPFAKES & DISINFORMATION DEEPFAKES & DISINFORMATION Agnieszka M. Walorska ANALYSISANALYSE 2 DEEPFAKES & DISINFORMATION IMPRINT Publisher Friedrich Naumann Foundation for Freedom Karl-Marx-Straße 2 14482 Potsdam Germany /freiheit.org /FriedrichNaumannStiftungFreiheit /FNFreiheit Author Agnieszka M. Walorska Editors International Department Global Themes Unit Friedrich Naumann Foundation for Freedom Concept and layout TroNa GmbH Contact Phone: +49 (0)30 2201 2634 Fax: +49 (0)30 6908 8102 Email: [email protected] As of May 2020 Photo Credits Photomontages © Unsplash.de, © freepik.de, P. 30 © AdobeStock Screenshots P. 16 © https://youtu.be/mSaIrz8lM1U P. 18 © deepnude.to / Agnieszka M. Walorska P. 19 © thispersondoesnotexist.com P. 19 © linkedin.com P. 19 © talktotransformer.com P. 25 © gltr.io P. 26 © twitter.com All other photos © Friedrich Naumann Foundation for Freedom (Germany) P. 31 © Agnieszka M. Walorska Notes on using this publication This publication is an information service of the Friedrich Naumann Foundation for Freedom. The publication is available free of charge and not for sale. It may not be used by parties or election workers during the purpose of election campaigning (Bundestags-, regional and local elections and elections to the European Parliament). Licence Creative Commons (CC BY-NC-ND 4.0) https://creativecommons.org/licenses/by-nc-nd/4.0 DEEPFAKES & DISINFORMATION DEEPFAKES & DISINFORMATION 3 4 DEEPFAKES & DISINFORMATION CONTENTS Table of contents EXECUTIVE SUMMARY 6 GLOSSARY 8 1.0 STATE OF DEVELOPMENT ARTIFICIAL
    [Show full text]
  • Pro Wrestling Over -Sell
    TTHHEE PPRROO WWRREESSTTLLIINNGG OOVVEERR--SSEELLLL™ a newsletter for those who want more Issue #1 Monthly Pro Wrestling Editorials & Analysis April 2011 For the 27th time... An in-depth look at WrestleMania XXVII Monthly Top of the card Underscore It's that time of year when we anything is responsible for getting Eddie Edwards captures ROH World begin to talk about the forthcoming WrestleMania past one million buys, WrestleMania, an event that is never it's going to be a combination of Tile in a shocker─ the story that makes the short of talking points. We speculate things. Maybe it'll be the appearances title change significant where it will rank on a long, storied list of stars from the Attitude Era of of highs and lows. We wonder what will wrestling mixed in with the newly Shocking, unexpected surprises seem happen on the show itself and gossip established stars that generate the to come few and far between, especially in the about our own ideas and theories. The need to see the pay-per-view. Perhaps year 2011. One of those moments happened on road to WreslteMania 27 has been a that selling point is the man that lit March 19 in the Manhattan Center of New York bumpy one filled with both anticipation the WrestleMania fire, The Rock. City. Eddie Edwards became the fifteenth Ring and discontent, elements that make the ─ So what match should go on of Honor World Champion after defeating April 3 spectacular in Atlanta one of the last? Oddly enough, that's a question Roderick Strong in what was described as an more newsworthy stories of the year.
    [Show full text]
  • Form and Function in Theatre for Survivors of Sexual Violence
    Re-Enter Backwards: form and function in theatre for survivors of sexual violence Thesis Presented in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the Graduate School of The Ohio State University By Elizabeth Joanne Wellman, B.A. Graduate Program in Theatre The Ohio State University 2011 Thesis Committee: Beth Kattelman, Advisor Jennifer Schlueter Copyright by Elizabeth Joanne Wellman 2011 Abstract While the use of theatre as a tool of advocacy for survivors of sexual violence is not a new concept, defining a sub-genre of theatre by these terms has not yet been done. It is important to mark a distinction between advocacy theatre and drama that includes themes of sexual violence. Advocacy theatre clearly states advocacy as a central goal of its efforts. There must also be a distinction between advocacy theatre and other forms of social theatre in order to better serve survivors by recognizing the contributions to this field and encouraging future growth. This thesis outlines observable trends in the form and function of advocacy theatre using examples across a diverse spectrum of performance including one-woman shows, community-created work, theatre for incarcerated women, women’s circus, docudrama, interactive theatre, and ensemble- driven drama. It also presents a case study of advocacy theatre, Breaking the Current by Jeanine Thompson (U.S.A, 1999). This thesis uses qualitative information, along with play reviews, interviews, film footage, production stills, thick description, and textual analysis to explore form and function in advocacy theatre, and acknowledges that it is difficult to evaluate the success of advocacy theatre due to a lack of quantifiable data.
    [Show full text]
  • Cybercrime: Protecting Your Law Firm from the Inevitable by Ben Glass and John Pirkopf
    Glass & Pirkopf | LAW OFFICE MANAGEMENT Cybercrime: Protecting Your Law Firm from the Inevitable By Ben Glass and John Pirkopf ata breach cases have made headlines in recent years, their breach protocol in the event the worst happens. But what Dfrom Yahoo to Marriot to Target to Equifax. While the really should that entail? This article addresses the most com- larger companies tend to attract more public attention, cyber- mon vulnerabilities in a law firm and best practices with crime does not discriminate, and more and more law firms respect to protecting both firm and client information. are impacted by the threat of or actual attacks. According to The Center for Strategic and International Studies (CSIS), the Law Firms and Cyber Security total global cost of cybercrime is closing in on $600 billion, There is more to securing a firm’s network and sensitive and this number is up from the 2014 estimate of $445 billion.1 data than a good password. Security needs to be built into Other estimates make that look conservative. According to Dr. the culture of your workplace. Increasingly, cyber criminals Michael McGuire, Senior Lecturer in Criminology at Surrey are employing clever and sophisticated methods to steal, University in England, the revenues of cybercrime have hit sabotage, or ransom firm data. Law firms are now being $1.5 Trillion annually.2 While this number is staggering in recognized by attackers as a sweet spot for attacks. This is and of itself, it is hard to comprehend exactly what that means due, in part, to the amount of highly sensitive data to which to a law firm.
    [Show full text]
  • Volume 5: Future Challenges of Cybercrime
    Future Challenges of Cybercrime Volume 5: Proceedings of the Futures Working Group Toby Finnie Tom Petee John Jarvis Editors 1 Acknowledgments The Futures Working Group and the authors that contributed to this volume wish to thank both Police Futurists International and the Federal Bureau of Investigation for supporting the efforts reflected herein. Additionally, the following individuals are recognized for their significant contributions to this volume: FBI Behavioral Science Unit Intern Angela Basso, BSU Visiting Scholar Hayley Daglis Cleary, and other staff of the FBI Training Division who provided significant assistance with the production of this volume including, but not limited to, the editing, organization, and formatting of this volume. Without their generous efforts and sincere commitment to assisting with this project, this work would not have been possible. Suggested Citation: The Future Challenges of Cybercrime: Volume 5 Proceedings of the Futures Working Group. Toby Finnie, Tom Petee, and John Jarvis, editors. Federal Bureau of Investigation: Quantico, Virginia 2010. Initial Release Date: September 22, 2010 Revised: November 4, 2010 Author information: Biographical information pertaining to individual contributors and authors can be found at http://futuresworkinggroup.cos.ucf.edu. The opinions and statements expressed throughout this volume are those of the individual authors and contributors and should not be considered an endorsement or a reflection of the official position of the Federal Bureau of Investigation, the Society of Police Futures International, or any other institution or organization for any policy, program, or service. 2 Table of Contents Acknowledgments............................................................................................................................2 Word from the Chairman………………………………………………………………………….5 Defining “Cyber-Crime”: Issues in Determining the Nature and Scope of Computer-Related Offenses……………………………………………………………………….6 Thomas A.
    [Show full text]
  • Torts Section 1B Jonathan Klick the Armageddon December 19, 2008 9
    Torts Section 1B Jonathan Klick The Armageddon December 19, 2008 9:30-1:30 This final exam consists of four questions. Each question will be given equal weight in determining your final grade (subject to your decision for #4). This is an open book and open note exam. You may use your casebook, class notes, casebook supplements, commercial outlines, commercial supplements, lucky charms, and any other printed or written materials you believe will be helpful in completing your answers. You will be given four hours to complete this exam, and you may allocate your time among the questions as you see fit. There is no answer sheet for this exam. You may write/type as long or as short an answer as you believe is necessary to completely answer the test questions. If you need extra bluebooks, please quietly request them from the proctor. If you finish early, please submit your bluebooks or computer disks to the exam proctor and quietly exit the room. If you perceive an ambiguity or error in any test question, please proceed to answer it, noting the ambiguity/error and making any reasonable assumptions you believe are necessary to answer the question. Please state these assumptions in your answer and provide your justification for the assumption. Good luck and have a nice break. 1. In an effort to compete with the world champion Phillies, the New York Mets sign six- time Cy Young-winning pitcher, Roger Clementine to a one year contract for the 2009- 2010 season. This signing came as a surprise since Clementine had been out of baseball since his September 16, 2007 start with the New York Yankees.
    [Show full text]
  • SOCIAL ENGINEERING 1 Topic:Social Engineering Risk and Management in Organisations References
    SOCIAL ENGINEERING 1 Topic:Social Engineering Risk and Management in Organisations References: Harvard Pages: 60 Words: 15000 words SOCIAL ENGINEERING 2 Social Engineering Risk and Management in Organisations [Name of the Writer] [Name of the Supervisor] [Course] SOCIAL ENGINEERING 3 Acknowledgement I am very thankful to my supervisor for his complete guidance in order to complete my dissertation; I was unable to accomplish my research without his practical advices. I have been really inspired by him because of his deep insight and experience which made me to perform at my best for my research. I am also thankful to my friends who supported me throughout the course and guided me for the completion of this research. Finally, I am really thankful to my parents for their on-going support, and always giving me the strength, courage and determination to face various challenges and for believing in my ability and trust. SOCIAL ENGINEERING 4 Abstract Social Engineering offers attackers a multitude of possibilities to reach through targeted manipulation and information to their desired goal. A particularly dangerous situation when the information of one person is used to access the computer system of an organization. The abuser is easily passed for a system operator or an IT manager or system engineer. Often the perpetrator is not even in direct contact with the victim. Even the most conservative in the management of sensitive information, people can fall into the trap of social engineering. On the one hand, the "technological neglect" makes people vulnerable when they treat their sensitive data too carelessly and publish private information on the Web and is sometimes too lazy to "clean up" their online profile regularly.
    [Show full text]
  • Cyber Influence Operations: an Overview and Comparative Analysis
    CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.
    [Show full text]
  • Armageddon and Beyond
    Armageddon and Beyond by Richard F. Ames Mankind is developing newer and more frightening technologies with which to destroy itself, while political and social tensions increase around the world. Will the years just ahead of us bring worldwide nuclear devastation, or usher in an era of lasting peace? Will the prophesied “Battle of Armageddon” soon bring destruction and death to our planet? What will “Armageddon” mean to you and your loved ones? And what will come afterward? Your Bible reveals a frightening time ahead—but there is ultimate hope! Read on, to learn the amazing truth! AB Edition 1.0, December 2007 ©2007 LIVING CHURCH OF GODTM All rights reserved. Printed in the U.S.A. This booklet is not to be sold! It has been provided as a free public educational service by the Living Church of God Scriptures in this booklet are quoted from the New King James Version (©Thomas Nelson, Inc., Publishers) unless otherwise noted. Cover: Tomorrow’s World Illustration n the first decade of the 21st century, most of us realize we live in a very dangerous world. It was just six decades ago that a I new weapon of unprecedented capacity was first unleashed, when the United States dropped atomic bombs on the cities of Hiroshima and Nagasaki in Japan on August 6 and 9, 1945. A new era of mass destruction had begun. At the end of World War II, General Douglas MacArthur, Supreme Commander of the Allied Powers, accepted Japan’s uncondi- tional surrender. Aboard the battleship U.S.S. Missouri, General MacArthur summarized the danger and the choice facing humanity in this new era: “Military alliances, balances of power, leagues of nations, all in turn failed, leaving the only path to be the way of the crucible of war.
    [Show full text]