Amazon Price: N/A (as of March 28, 2017 05:38 –
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.
Amazon Price: $25.00 (as of March 28, 2017 00:59 –
From the author of Black Hawk Down comes the story of the battle between those determined to exploit the internet and those committed to protect it—the ongoing war taking place literally beneath our fingertips.
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Amazon Price: $55.00 $51.67 You save: $3.33 (6%). (as of March 27, 2017 22:18 –
In a world in which cyberspace is becoming every country’s center of gravity, the issue of cyberwar can no longer be ignored. Cyberspace in Peace and War is the first comprehensive, instructional guide to the challenge of cyberwar: how to conduct it but, more importantly, how to avoid it using a mix of cybersecurity policies coupled with deterrence, escalation, signaling, and norms strategies. The result of over twenty years of analysis and assessment by author Martin C. Libicki, this text should be of particular interest to those concerned with the current and future challenges that face the digital frontier. Though written from a U.S. perspective, the principles discussed are globally relevant.
Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses―leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.
Amazon Price: N/A (as of March 27, 2017 16:38 –
In this revealing insider’s look at the US intelligence community’s efforts to fight the insurgency in Iraq, author Steven K. O’Hern, who served in Iraq in 2005 as a senior intelligence officer, offers a critical assessment of our intelligence failures and suggests ways of improving our ability to fight an often elusive enemy.
O’Hern criticizes America’s military leaders for being enamored with high-technology solutions for all situations, including intelligence operations. Essentially, we are still relying on an intelligence system that was designed to beat the Soviet army. Using examples from human source operations conducted in Iraq, this book explains why human intelligence—not technology—is the key to defeating an insurgency and why the US is so poor at using what the military calls "HUMINT." O’Hern also cites internal structural problems that work against effective intelligence operations. The author gives examples of missed opportunities that resulted from information being caught in "stovepipes" and red tape.