Si Vis Pacem, Para Bellum


The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies

This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries’ engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation’s technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships between major economies, and explains how attempts to secure the cyber domain have been hampered by the lack of an international consensus on key issues and concepts. The book also reveals how some economies are now facing a tricky trade-off between economically productive uses of emerging technologies and an enhanced cybersecurity profile. In the context of current paradigms related to the linkages between security and trade/investment, it also delves into new perspectives that are being brought to light by emerging cybersecurity issues.


Managing Cyber Attacks in International Law, Business, and Relations

This book presents a framework to reconceptualize Internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace.


Cyber Operations and the Use of Force in International Law

The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of use of force, armed attack, and armedconflict and asks whether existing laws created for analogue technologies can be applied to new digital developments.The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in thecontext of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are notaccompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.


High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected.


Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.

The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
Read More