From Publishers Weekly: Written by a Defense Intelligence Agency analyst, this is a straightforward examination of the structure, operations and methodology of the intelligence services of the People's Republic of China. Eftimiades describes how the Ministry of State Security–China's preeminent civilian intelligence-gathering entity–draws on the services of diplomats, commercial representatives, Chinese communities in overseas cities and students. (The People's Republic sends approximately 40,000 students abroad annually.) His analysis of the case of Larry Wu-Tai Chin, a longtime CIA employee who was convicted of espionage in 1986, reveals much about Chinese operations in the United States. Although Eftimiades cautions that the Ministry of State Security will continue to penetrate and exploit the political, academic, industrial and technological institutions of Western nations, he adds reassuringly that China's intelligence apparatus is hobbled by its own red tape and hindered by the stultifying bureaucracy of the Chinese Communist Party. Of interest mainly to specialists.
This textbook provides a coherent introduction to post-Cold War and post-9/11 military theory for upper-level students seeking an initial understanding of strategic studies.
In the contemporary period there has been significant and growing interest among students about international security issues. While many publications focus on one particular aspect of military strategy, there is no single volume that provides a comprehensive yet accessible overview of strategic thought in this new era.
Continue reading “Modern Military Strategy: An Introduction”
What people are saying about Inside Cyber Warfare
"The necessary handbook for the 21st century."
Continue reading “Inside Cyber Warfare: Mapping the Cyber Underworld”
China‘s INEW doctrine combining network attack with electronic warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with unique network attack, exploitation, and defense capabilities. IW unit training focuses on improving network attack skills during military exercises. The integration of the IW militia units with commercial technology companies provides infrastructure and technical support enabling the units to conduct operations. The IW units gather intelligence on an adversary‘s networks identifying critical nodes and security weaknesses. Armed with this intelligence, these units are capable of conducting network attack to disrupt or destroy the identified critical nodes of an enemy‘s C4ISR assets allowing China to use military force in a local war. In an effort to regain its former status, China pursues the strategic goal of reunification of its claimed sovereign territories and lands using economic influence as the primary means but will resort to military force if necessary. Recent cyber activities attributed to China suggest that network exploitation is currently underway and providing military, political, and economic information to the CCP. Domestically and internationally, China views Taiwan and the United States respectively as the major threats to the CCP.
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
Continue reading “Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door”