Securing cyberspace has become one of the most pressing security challenges of the twenty-first century, impacting as it does on the everyday activity of governments, businesses and citizens alike. The cyber world and its associated technologies have, on the one hand, created social, cultural, economic and political opportunities for all. On the other hand, its borderless nature has fostered threats in the form of cyber attacks and cybercrime. The European Union (EU) is not immune to such threats, and produced its first Cybersecurity Strategy in 2013 to address more comprehensively the challenges that it faces. Drawing on the concepts of resilience and security governance, this book offers a novel framework for understanding and assessing how far the EU has progressed in embedding the necessary conditions for a resilient and secure ecosystem to emerge in Europe and beyond. It asks how far the EU has facilitated movement to an effective culture of cybersecurity that will allow it to fulfil its own ambitions; promote its values; and exert its influence in a dynamic global order that is increasingly reliant on digital interoperability and connectivity.
The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming—each one more pernicious than the last—from China, Russia, Iran, North Korea, the Middle East, and points unknown. The continuing attacks raise a deeply disturbing question: Is the issue simply beyond the reach of our government, political leaders, business leaders, and technology visionaries to resolve? In Hacked, veteran cybersecurity journalist Charlie Mitchell reveals the innovative, occasionally brilliant, and too-often hapless government and industry responses to growing cybersecurity threats. He examines the internal power struggles in the federal government, the paralysis on Capitol Hill, and the industry's desperate effort to stay ahead of both the bad guys and the government.
New York Times bestselling author and veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars.
America is at war, but most of its citizens don’t know it.
Continue reading “iWar: War and Peace in the Information Age”
Much attention has been paid in recent years to the emergence of "Internet activism," but scholars and pundits disagree about whether online political activity is different in kind from more traditional forms of activism. Does the global reach and blazing speed of the Internet affect the essential character or dynamics of online political protest? In Digitally Enabled Social Change, Jennifer Earl and Katrina Kimport examine key characteristics of web activism and investigate their impacts on organizing and participation.Earl and Kimport argue that the web offers two key affordances relevant to activism: sharply reduced costs for creating, organizing, and participating in protest; and the decreased need for activists to be physically together in order to act together. Drawing on evidence from samples of online petitions, boycotts, and letter-writing and e-mailing campaigns, Earl and Kimport show that the more these affordances are leveraged, the more transformative the changes to organizing and participating in protest.
This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations (COs). It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace.
Written by world-leading philosophers, ethicists, policy-makers, and law and military experts, the essays cover such topics as the conceptual novelty of COs and the ethical problems that this engenders; the applicability of existing conceptual and regulatory frameworks to COs deployed in case of conflicts; the definition of deterrence strategies involving COs; and the analysis of models to foster cooperation in managing cyber crises.
Continue reading “Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative (Philosophical Studies Series)”