Best-selling journalist Antony Loewenstein trav­els across Afghanistan, Pakistan, Haiti, Papua New Guinea, the United States, Britain, Greece, and Australia to witness the reality of disaster capitalism. He discovers how companies such as G4S, Serco, and Halliburton cash in on or­ganized misery in a hidden world of privatized detention centers, militarized private security, aid profiteering, and destructive mining.

Disaster has become big business. Talking to immigrants stuck in limbo in Britain or visiting immigration centers in America, Loewenstein maps the secret networks formed to help cor­porations bleed what profits they can from economic crisis. He debates with Western contractors in Afghanistan, meets the locals in post-earthquake Haiti, and in Greece finds a country at the mercy of vulture profiteers. In Papua New Guinea, he sees a local commu­nity forced to rebel against predatory resource companies and NGOs.

What emerges through Loewenstein’s re­porting is a dark history of multinational corpo­rations that, with the aid of media and political elites, have grown more powerful than national governments. In the twenty-first century, the vulnerable have become the world’s most valu­able commodity. Disaster Capitalism is published by Verso in 2015.

Profits_of_doom_cover_350Vulture capitalism has seen the corporation become more powerful than the state, and yet its work is often done by stealth, supported by political and media elites. The result is privatised wars and outsourced detention centres, mining companies pillaging precious land in developing countries and struggling nations invaded by NGOs and the corporate dollar. Best-selling journalist Antony Loewenstein travels to Afghanistan, Pakistan, Haiti, Papua New Guinea and across Australia to witness the reality of this largely hidden world of privatised detention centres, outsourced aid, destructive resource wars and militarized private security. Who is involved and why? Can it be stopped? What are the alternatives in a globalised world? Profits of Doom, published in 2013 and released in an updated edition in 2014, challenges the fundamentals of our unsustainable way of life and the money-making imperatives driving it. It is released in an updated edition in 2014.
forgodssakecover Four Australian thinkers come together to ask and answer the big questions, such as: What is the nature of the universe? Doesn't religion cause most of the conflict in the world? And Where do we find hope?   We are introduced to different belief systems – Judaism, Christianity, Islam – and to the argument that atheism, like organised religion, has its own compelling logic. And we gain insight into the life events that led each author to their current position.   Jane Caro flirted briefly with spiritual belief, inspired by 19th century literary heroines such as Elizabeth Gaskell and the Bronte sisters. Antony Loewenstein is proudly culturally, yet unconventionally, Jewish. Simon Smart is firmly and resolutely a Christian, but one who has had some of his most profound spiritual moments while surfing. Rachel Woodlock grew up in the alternative embrace of Baha'i belief but became entranced by its older parent religion, Islam.   Provocative, informative and passionately argued, For God's Sakepublished in 2013, encourages us to accept religious differences, but to also challenge more vigorously the beliefs that create discord.  
After Zionism, published in 2012 and 2013 with co-editor Ahmed Moor, brings together some of the world s leading thinkers on the Middle East question to dissect the century-long conflict between Zionism and the Palestinians, and to explore possible forms of a one-state solution. Time has run out for the two-state solution because of the unending and permanent Jewish colonization of Palestinian land. Although deep mistrust exists on both sides of the conflict, growing numbers of Palestinians and Israelis, Jews and Arabs are working together to forge a different, unified future. Progressive and realist ideas are at last gaining a foothold in the discourse, while those influenced by the colonial era have been discredited or abandoned. Whatever the political solution may be, Palestinian and Israeli lives are intertwined, enmeshed, irrevocably. This daring and timely collection includes essays by Omar Barghouti, Jonathan Cook, Joseph Dana, Jeremiah Haber, Jeff Halper, Ghada Karmi, Antony Loewenstein, Saree Makdisi, John Mearsheimer, Ahmed Moor, Ilan Pappe, Sara Roy and Phil Weiss.
The 2008 financial crisis opened the door for a bold, progressive social movement. But despite widespread revulsion at economic inequity and political opportunism, after the crash very little has changed. Has the Left failed? What agenda should progressives pursue? And what alternatives do they dare to imagine? Left Turn, published by Melbourne University Press in 2012 and co-edited with Jeff Sparrow, is aimed at the many Australians disillusioned with the political process. It includes passionate and challenging contributions by a diverse range of writers, thinkers and politicians, from Larissa Berendht and Christos Tsiolkas to Guy Rundle and Lee Rhiannon. These essays offer perspectives largely excluded from the mainstream. They offer possibilities for resistance and for a renewed struggle for change.
The Blogging Revolution, released by Melbourne University Press in 2008, is a colourful and revelatory account of bloggers around the globe why live and write under repressive regimes - many of them risking their lives in doing so. Antony Loewenstein's travels take him to private parties in Iran and Egypt, internet cafes in Saudi Arabia and Damascus, to the homes of Cuban dissidents and into newspaper offices in Beijing, where he discovers the ways in which the internet is threatening the ruld of governments. Through first-hand investigations, he reveals the complicity of Western multinationals in assisting the restriction of information in these countries and how bloggers are leading the charge for change. The blogging revolution is a superb examination about the nature of repression in the twenty-first century and the power of brave individuals to overcome it. It was released in an updated edition in 2011, post the Arab revolutions, and an updated Indian print version in 2011.
The best-selling book on the Israel/Palestine conflict, My Israel Question - on Jewish identity, the Zionist lobby, reporting from Palestine and future Middle East directions - was released by Melbourne University Press in 2006. A new, updated edition was released in 2007 (and reprinted again in 2008). The book was short-listed for the 2007 NSW Premier's Literary Award. Another fully updated, third edition was published in 2009. It was released in all e-book formats in 2011. An updated and translated edition was published in Arabic in 2012.

We have been warned; Western states remove our privacy by stealth

The vital whistle-blowing of Edward Snowden continues to bear fruit. We have a right in a democratic society to know that our privacy is violated on a daily basis. And what we can do to protect ourselves.

The Guardian (by Glenn Greenwald, James Ball and Julia Borger):

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.

The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees thatinternet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.

The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – “the use of ubiquitous encryption across the internet”.

Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.

Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.

The files, from both the NSA and GCHQ, were obtained by the Guardian, and the details are being published today in partnership with the New York Times and ProPublica. They reveal:

• A 10-year NSA program against encryption technologies made a breakthrough in 2010 which made “vast amounts” of data collected through internet cable taps newly “exploitable”.

• The NSA spends $250m a year on a program which, among other goals, works with technology companies to “covertly influence” their product designs.

• The secrecy of their capabilities against encryption is closely guarded, with analysts warned: “Do not ask about or speculate on sources or methods.”

• The NSA describes strong decryption programs as the “price of admission for the US to maintain unrestricted access to and use of cyberspace”.

• A GCHQ team has been working to develop ways into encrypted traffic on the “big four” service providers, named as Hotmail, Google, Yahoo and Facebook.

Pro Publica (by Jeff Larson, Scott Shane and Nicole Perlroth):

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.

The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The N.S.A. hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

“For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”

When the British analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, “those not already briefed were gobsmacked!”

An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.