Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. Explaining fundamental principles in an interdisciplinary manner, it sheds light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.
The United States is vulnerable to attacks from cyberterrorists. A “Digital World Trade Center Attack”, possibly killing thousands and causing billions of dollars in damage. This paper will provide fundamental background information on what cyberterror is and what it means. It also presents a model to understand the anatomy of cyberterrorism, describing some real-world cyber events, assesses cyberterrorist capabilities, and finally makes specific recommendations for improvement in cyber security.
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a road map for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
An important book on a topic that has been neglected for too long, Geopolitics: A Guide to the Issues will provide readers with an enhanced understanding of how geography influences personal, national, and international economics, politics, and security. The work begins with the history of geopolitics from the late 19th century to the present, then discusses the intellectual renaissance the discipline is experiencing today due to the prevalence of international security threats involving territorial, airborne, space-based, and waterborne possession and acquisition.
The book emphasizes current and emerging international geopolitical trends, examining how the U.S. and other countries, including Australia, Brazil, China, India, and Russia, are integrating geopolitics into national security planning. It profiles international geopolitical scholars and their work, and it analyzes emerging academic, military, and governmental literature, including "gray" literature and social networking technologies, such as blogs and Twitter.
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.
Continue reading “The Plot to Hack America: How Putin’s Cyberspies and WikiLeaks Tried to Steal the 2016 Election”