America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and WarfareA former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon‘s secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a “glass house,” all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.

Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.

The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.

In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

Price: $27.95

Click here to buy from Amazon

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

What people are saying about Inside Cyber Warfare

“The necessary handbook for the 21st century.”

–Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

“A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war.”

–Jim Stogdill, CTO, Mission Services Accenture

You may have heard about “cyber warfare” in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who's responsible
  • Learn how hackers are “weaponizing” malware to attack vulnerabilities at the application level

Price: $39.99

Click here to buy from Amazon

Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Studies in Security and International Affairs)

Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Studies in Security and International Affairs)Increasingly, the power of a large, complex, wired nation like the United States rests on its ability to disrupt would-be cyber attacks and to be resil­ient against a successful attack or recurring campaign. Addressing the con­cerns of both theorists and those on the national security front lines, Chris C. Demchak presents a unified strategy for survival in an interconnected, ever-messier, more surprising cybered world and examines the institutional adaptations required of our defense, intelligence, energy, and other critical sectors for national security.

Demchak introduces a strategy of “security resilience” against surprise attacks for a cybered world that is divided between modern, digitally vulner­able city-states and more dysfunctional global regions. Its key concepts build on theories of international relations, complexity in social-technical systems, and organizational-institutional adaptation. Demchak tests the strategy for reasonableness in history’s few examples of states disrupting rather than conquering and being resilient to attacks, including ancient Athens and Sparta, several British colonial wars, and two American limited wars. She applies the strategy to modern political, social, and technical challenges and presents three kinds of institutional adaptation that predicate the success of the security resilience strategy in response. Finally, Demchak discusses implications for the future including new forms of cyber aggression like the Stuxnet worm, the rise of the cyber-command concept, and the competition between the U.S. and China as global cyber leaders.

Wars of Disruption and Resilience offers a blueprint for a national cyber-power strategy that is long in time horizon, flexible in target and scale, and practical enough to maintain the security of a digitized nation facing violent cybered conflict.

Price: $24.95

Click here to buy from Amazon

Chinese Cyber Nationalism: Evolution, Characteristics, and Implications

Chinese Cyber Nationalism: Evolution, Characteristics, and ImplicationsChinese Cyber Nationalism offers the first comprehensive examination of the social and ideological movement that mixes Confucian cultural traditions and advanced media technology. Over the past decade, the Internet has increasingly become a communication center, organizational platform, and channel of execution by which Chinese nationalistic causes have been promoted throughout the world.

 

 

 

 

 

 

Price: $34.95

Click here to buy from Amazon

Chinese Intelligence Operations

Rating: 
Amazon Price: $31.95 $23.22 You save: $8.73 (27%). (as of November 23, 2017 05:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

From Publishers Weekly: Written by a Defense Intelligence Agency analyst, this is a straightforward examination of the structure, operations and methodology of the intelligence services of the People's Republic of China. Eftimiades describes how the Ministry of State Security–China's preeminent civilian intelligence-gathering entity–draws on the services of diplomats, commercial representatives, Chinese communities in overseas cities and students. (The People's Republic sends approximately 40,000 students abroad annually.) His analysis of the case of Larry Wu-Tai Chin, a longtime CIA employee who was convicted of espionage in 1986, reveals much about Chinese operations in the United States. Although Eftimiades cautions that the Ministry of State Security will continue to penetrate and exploit the political, academic, industrial and technological institutions of Western nations, he adds reassuringly that China's intelligence apparatus is hobbled by its own red tape and hindered by the stultifying bureaucracy of the Chinese Communist Party. Of interest mainly to specialists.