CyberWar

Si Vis Pacem, Para Bellum

By

The Plot to Hack America: How Putin’s Cyberspies and WikiLeaks Tried to Steal the 2016 Election

Rating: 
Amazon Price: N/A (as of March 28, 2017 05:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.

Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.
Read More

By

Worm: The First Digital World War

Rating: 
Amazon Price: $25.00 (as of March 28, 2017 00:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

From the author of Black Hawk Down comes the story of the battle between those determined to exploit the internet and those committed to protect it—the ongoing war taking place literally beneath our fingertips.

The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

By

Cyberspace in Peace and War (Transforming War)

Rating: 
Amazon Price: $55.00 $51.67 You save: $3.33 (6%). (as of March 27, 2017 22:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In a world in which cyberspace is becoming every country’s center of gravity, the issue of cyberwar can no longer be ignored. Cyberspace in Peace and War is the first comprehensive, instructional guide to the challenge of cyberwar: how to conduct it but, more importantly, how to avoid it using a mix of cybersecurity policies coupled with deterrence, escalation, signaling, and norms strategies. The result of over twenty years of analysis and assessment by author Martin C. Libicki, this text should be of particular interest to those concerned with the current and future challenges that face the digital frontier. Though written from a U.S. perspective, the principles discussed are globally relevant.

Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses―leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.
Read More

By

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

Rating: 
Amazon Price: $27.95 (as of March 28, 2017 05:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Read More

By

Intelligence Wars: Lessons from Baghdad

Rating: 
Amazon Price: N/A (as of March 27, 2017 16:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In this revealing insider’s look at the US intelligence community’s efforts to fight the insurgency in Iraq, author Steven K. O’Hern, who served in Iraq in 2005 as a senior intelligence officer, offers a critical assessment of our intelligence failures and suggests ways of improving our ability to fight an often elusive enemy.

O’Hern criticizes America’s military leaders for being enamored with high-technology solutions for all situations, including intelligence operations. Essentially, we are still relying on an intelligence system that was designed to beat the Soviet army. Using examples from human source operations conducted in Iraq, this book explains why human intelligence—not technology—is the key to defeating an insurgency and why the US is so poor at using what the military calls "HUMINT." O’Hern also cites internal structural problems that work against effective intelligence operations. The author gives examples of missed opportunities that resulted from information being caught in "stovepipes" and red tape.
Read More

/* */