#Klaus Reinders
Explore tagged Tumblr posts
Text
[Lemme borrow and expand from my woefully neglected Resources / Bibliography.]
Organised crime, with a slant towards the Italian mafia because it fascinates me the most:
Kelly Barksby, “Constructing criminals: the creation of identity within criminal mafias” (Keele University, 2013)
Filippo Spadafora, Origins of the Sicilian Mafia (2010)
This Rogue, Mafia Lore: Honour and Blood (2016)
Pino Arlacchi, Mafia Business: The Mafia Ethic and the Spirit of Capitalism (Oxford University Press, 1988) *
Letizia Paoli, “Italian Organised Crime: Mafia Associations and Criminal Enterprises” in Global Crime Vol. 6, No. 1 (Routledge, 2004)
Diego Gambetta, The Sicilian Mafia: The Business of Private Protection (Harvard University Press, 1993)
John Dickie, Cosa Nostra: A History of the Sicilian Mafia (Palgrave Macmillan 2004)
Henner Hess, Mafia and Mafiosi (New York University Press, 1998)
Marco Gasparini, The Mafia: History and Legend (Flammarion , 2011) *
Alexander Stille, Excellent Cadavers: The Mafia and the Death of the First Italian Republic (Vintage, 1995)
Mark Bowden, Killing Pablo: The Hunt for the World’s Greatest Outlaw (Atlantic Books, 2002)
David E. Kaplan & Alec Dubro, Yakuza: Japan’s Criminal Underwold (University of California Press, 2002)
Peter B. E. Hill, The Japanese Mafia: Yakuza, Law, and the State (Oxford University Press, 2003)
Gangs:
Mark S. Fleisher, Beggars and Thieves: Lives of Urban Street Criminals (The University of Wisconsin Press, 1995)
Darrell J. Steffensmeier, Delinquent Girls: Contexts, Relationships, and Adaptation (Springer-Verlag, 2012)
Herbert C. Covey, Crips and Bloods: A guide to an American subculture (Greenwood, 2015)
Deborah Lamm Weisel, Contemporary Gangs: An Organizational Analysis (LFB Scholarly Publishing, 2002)
David Skarbek, The Social Order of the Underworld: How Prison Gangs Govern the American Penal System (Oxford University Press, 2014)
Ken Gelder, Subcultures: Cultural Histories and Social Practice (Routledge); The subcultures reader (with Sarah Thornton, Routledge, 1997)
M.G. Bullen, Thief in Law: A guide to Russian prison tattoos and Russian-speaking organised crime gangs (One’s Own Publishing House, 2016)
Illegalism:
Bernard Thomas, The Lives of Sailor, Thief, Anarchist, Convict Alexandre Marius Jacob (1879-1954) (Tchou Éditions, 1970)
Jean-Marc Delpech, “Parcours et Réseaux d’un Anarchiste: Alexandre Marius Jacob, 1879-1954“, (Université de Lorraine, 2006)
Richard Parry, The Bonnot Gang: The story of the French illegalists (Rebel Press, 1987)
Doug Imrie, “The illegalists” in Anarchy: a Journal Of Desire Armed (1994)
Chris Ealham, Class, Culture and Conflict in Barcelona, 1898-1937 (Routledge, 2005)
Antonio Tellez, Sabaté, Guerilla Extraordinary / La Guerriglia Urbana in Spagna: Sabaté (1974)
Klaus Schönberger, VaBanque: Bankraub – Theorie, Praxis, Geschichte (Assoziation A, 2000) ["Bank Robbery: Theory, Practice, History" - a German book which AFAIK has only been translated to Italian and Greek.]
Insurgencies:
Eric Hobsbawm, Revolutionaries (Weidenfeld & Nicolson, 1973) (see here an excerpt on "Cities and Insurrection"); Bandits (Weidenfeld & Nicolson, 1969)
lse Biel, “Zapatista Materiality Disseminated: A Co-Construction Reconsidered” (University of New Mexico, 2012)
Coutrney Jung, The Moral Force of Indigenous Politics: Critical Liberalism and the Zapatistas (Cambridge University Press, 2008)
Joshua Bloom & Waldo E. Martin Jr., Black against Empire (University of California Press, 20123) [on the Black Panther Party]
Sundiata Acoli, A Brief History of the Black Panther Party and Its Place In the Black Liberation Movement (1985)
Abel Paz, Durruti: the people armed (Black Rose, 1976) [I THINK this is the english translation of Durruti: el proletariado en armas later published as Durruti en la revolución española, which I meant]
Ralf Reinders & Ronald Fritzsch, Die Bewngung 2.Juni (1985) ["The 2 June Movement", don't know if it's translated in English.]
That's… hardly an expertly curated list, esp. the revolutionary stuff. I read my foundational texts in that department mostly by borrowing, rarely in English, and long before I had organisational skills, or Calibre. Essential topics aren't covered here. You gotta look up RAF, the Red Brigades, Carlos, so many things.
The subject is HUGE, op! Absolutely enormous. I get dizzy thinking about it.
Please recommend me reliable books, documentaries, pieces of journalism etc. that you know of about:
organized crime
semi-organized crime i.e. street gangs and the like
terrorists
guerrilla insurgencies
and similar things.
I'm very interested understanding illegitimate (i.e. not conducted by a government) organized violence and how it functions, but naturally it's hard to find good information.
739 notes
·
View notes
Text
Impressionen vom Portrait-Workshop in Hamburg mit Stephan Wiesner und Klaus Reinders (Tag 2/2)
Impressionen vom Portrait-Workshop in Hamburg mit Stephan Wiesner und Klaus Reinders (Tag 2/2)
Fortsetzung meines Berichts zum Portrait-Workshop vom 23. + 24. März 2019 in Hamburg:
Nachtrag zum Vorabend (Tag 1)
Das Elbschlösschen ist wohl unter Fotografen wie auch Touristen eins der beliebtesten Motive in der Hamburger Speicherstadt. So führte uns Ben Regge auf unserem abendlichen Fotowalk durch Hamburgs Hafencity zuletzt auch zu diesem Spot.
Hamburger Elbschlösschen – in…
View On WordPress
0 notes
Photo
© Klaus Reinders by klausreinders on Flickr.
6 notes
·
View notes
Text
5G and IoT Security Update from ETSI Security Week 2018
ETSI Security Week 2018 (link) was held at ETSI's Headquarters in Sophia Antipolis, South of France last week. It covered wide variety of topics including 5G, IoT, Cybersecurity, Middlebox, Distributed Ledger Technology (DLT), etc. As 5G and IoT is of interest to the readers of this blog, I am providing links to the presentations so anyone interested can check them out at leisure.
Before we look at the presentations, what exactly was the point of looking at 5G Security? Here is an explanation from ETSI: 5G phase 1 specifications are now done, and the world is preparing for the arrival of 5G networks. A major design goal of 5G is a high degree of flexibility to better cater for specific needs of actors from outside the telecom sector (e.g. automotive industry, mission-critical organisations). During this workshop, we will review how well 5G networks can provide security for different trust models, security policies, and deployment scenarios – not least for ongoing threats in the IoT world. 5G provides higher flexibility than legacy networks by network slicing and virtualization of functions. The workshop aims to discuss how network slicing could help in fulfilling needs for different users of 5G networks. 5G will allow the use of different authentication methods. This raises many interesting questions. How are these authentication methods supported in devices via the new secure element defined in ETSI SCP, or vendor-specific concepts? How can mission-critical and low-cost IoT use cases coexist side-by-side on the same network? The 5G promise of higher flexibility is also delivered via its Service-Based Architecture (SBA). SBA provides open 3rd party interfaces to support new business models which allow direct impact on network functions. Another consequence of SBA is a paradigm shift for inter-operator networks: modern APIs will replace legacy signaling protocols between networks. What are the relevant security measures to protect the SBA and all parties involved? What is the role of international carrier networks like IPX in 5G? Event Objectives The workshop intends to:
Gather different actors involved in the development of 5G, not only telecom, and discuss together how all their views have shaped phase 1 of 5G, to understand how security requirements were met, and what challenges remain;
Discuss slicing as a means to implement separate security policies and compartments for independent tenants on the same infrastructure;
Give an update of what is happening in 3GPP 5G security;
Explain to IoT players what 5G security can (and cannot) do for them, including risks and opportunities related to alternative access credentials;
Understand stakeholders' (PMNs, carriers, GSMA, vendors) needs to make SBA both secure and successful. How can SBA tackle existing issues in interconnect networks like fraud, tracking, privacy breaches;
Allow vendors to present interesting proposals for open security questions in 5G: secure credential store, firewalling SBA's RESTful APIs;
Debate about hot topics such as: IoT security, Slicing security, Privacy, Secure storage and processing and Security of the interconnection network.
So here are the relevant presentations: Session 1: Input to 5G: Views from Different Stakeholders Session Chair: Bengt Sahlin, Ericsson Hardening a Mission Critical Service Using 5G, Peter Haigh, NCSC Security in the Automotive Electronics Area, Alexios Lekidis, SecurityMatters Integrating the SIM (iUICC), Adrian Escott, QUALCOMM Smart Secure Platform, Klaus Vedder, Giesecke & Devrient, ETSI SCP Chairman Network Slicing, Anne-Marie Praden, Gemalto Don't build on Sand: Validating the Security Requirements of NFV Infrastructure to Confidently Run Slices, Nicolas Thomas, Fortinet 5G Enhancements to Non-3GPP Access Security, Andreas Kunz, Lenovo Security and Privacy of IoT in 5G, Marcus Wong, Huawei Technologies ITU-T activities and Action Plan on 5G Security, Yang Xiaoya, ITU-T SG17 Wrap up: 5G Overview from 3GPP SA3 Perspective and What is There to Be Done for Phase 2, Sander Kievit, TNO Session 2: Security in 5G Inter-Network Signalling Session Chair: Stefan Schroeder, T-Systems Presentation on SBA: Introduction of the Topic and Current Status in SA3, Stefan Schroeder, T-Systems 5G Inter-PLMN Security: The Trade-off Between Security and the Existing IPX Business Model, Ewout Pronk, KPN on behalf of GSMA Diameter End to End Security Subgroup Secure Interworking Between Networks in 5G Service Based Architecture, Silke Holtmanns, Nokia Bell Labs Security Best Practises using RESTful APIs, Sven Walther, CA Technologies Identifying and Managing the Issues around 5G Interconnect Security, Stephen Buck, Evolved Intelligence Zero Trust Security Posture in 5G Architecture, Galina Pildush, Palo Alto Networks (Missing) Session 1 & 2 Workshop Wrap up: 5G Phase 1 Conclusions and Outlook Towards Phase 2 - Stefan Schroeder, T-Systems and Bengt Sahlin, Ericsson Session 5: Benefits and Challenges of 5G and IoT From a Security Perspective Session Chair: Arthur van der Wees, Arthur's Legal Setting the Scene, Franck Boissière, European Commission ENISA's View on Security Implications of IoT and 5G, Apostolos Malatras, ENISA Smart City Aspects, Bram Reinders, Institute for Future of Living The Network Operators Perspective on IoT Security, Ian Smith, GSMA Related Links:
Detecting false base stations in mobile networks - Ericsson Research Blog
5G Security Updates - March 2018 - 3G4G Blog
Introduction to 3GPP Security in Mobile Cellular Networks - 3G4G Blog
from My Updates http://blog.3g4g.co.uk/2018/06/5g-and-iot-security-update-from-etsi.html
0 notes
Photo
STRKNG on Twitter: "Editors' selection 2017-01-11 Klaus Reinders https://t.co/HrelHtRwTN NESSI #People #Germany #Emden #strkng https://t.co/dLutfgBQJs" http://ift.tt/2joQ4yO
0 notes
Text
Impressionen vom Portrait-Workshop in Hamburg mit Stephan Wiesner und Klaus Reinders (Tag 1/2)
Impressionen vom Portrait-Workshop in Hamburg mit Stephan Wiesner und Klaus Reinders (Tag 1/2)
Am vergangenen Wochenende habe ich in Hamburg gleich zwei Portrait-Workshops mit Stephan Wiesner und Klaus Reinders besucht. Es waren zwei abwechslungsreiche Workshops, einer mit dem Schwerpunkt Blitzfotografie und einer mit dem Schwerpunkt Tageslicht. In diesem und einem weiteren Beitrag möchte ich darüber berichten, wie es war und was ich gelernt habe. Vielleicht hilft es Dir ja bei Deiner…
View On WordPress
0 notes