America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare


Joel Brenner - 2011
    An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

The Internet Police: How Crime Went Online, and the Cops Followed


Nate Anderson - 2013
    It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.

International Law


Antonio Cassese - 2001
    It has been fully revised and updated to include all recent developments in the subject, and contains a new chapter on terrorism as well as extensive revision of the section on state responsibility. Providing a comprehensive commentary on international law as a whole, it compares the traditional legal position with the developing and evolving law in a way that is sensitive to political and economic considerations, as well as including detailed yet accessible examinations of state responsibility and international criminal law. The late Professor Cassese was a leading figure in the field, and this new edition takes full advantage of his extensive experience to provide a more personal approach to the subject than is typically found in the standard textbook, acting as good intellectual exercise for the stronger student.The late Antonio Cassese was the Editor of the Journal of International Criminal Justice. To read sample articles from the journal visit: www.jicj.oupjournals.org

May It Please Your Lordship


Toby Potts - 2012
    Stirring speeches to rapt juries, triumphant press interviews and enormous fees paid by grateful clients. He can see it all. But unfortunately, he has reckoned without Judge 'Bonkers' Clarke, The Honourable Mr 'Sourpuss' Boniface and a range of other equally terrifying, grumpy and borderline insane judges - not to mention tricky solicitors, bent coppers and dodgy defendants.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet


Joseph Menn - 2010
    His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.

Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power


David E. Sanger - 2012
    . . THE CRITICAL MOMENTS IN THE COVERT WAR AGAINST IRAN, THE STRUGGLES TO DEAL WITH A RECALCITRANT PAKISTAN AND ITS FAST-GROWING NUCLEAR ARSENAL, THE TENSIONS WITH THE AMERICAN MILITARY OVER AFGANISTAN AND WITH ALLIES SWEPT UP IN THE CHAOS OF THE ARAB SPRING Three and a half years ago, David Sanger’s book The Inheritance: The World Obama Confronts and the Challenges to American Power described how a new American president came to office with the world on fire. Now, just as the 2012 presidential election battle begins, Sanger follows up with an eye-opening, news-packed account of how Obama has dealt with those challenges, relying on innovative weapons and reconfigured tools of American power to try to manage a series of new threats. Sanger describes how Obama’s early idealism about fighting “a war of necessity” in Afghanistan quickly turned to fatigue and frustration, how the early hopes that the Arab Spring would bring about a democratic awakening slipped away, and how an effort to re-establish American power in the Pacific set the stage for a new era of tensions with the world’s great rising power, China. As the world seeks to understand the contours of the Obama Doctrine, Confront and Conceal is a fascinating, unflinching account of these complex years, in which the president and his administration have found themselves struggling to stay ahead in a world where power is diffuse and America’s ability to exert control grows ever more elusive.

To Be Fair: Confessions of a District Court Judge


Rosemary Riddell - 2021
    

Inside Cyber Warfare: Mapping the Cyber Underworld


Jeffrey Carr - 2009
    You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Business Law


Lee Mei Pheng - 2009
    The authors' comprehensive experience in legal practice, banking and teaching have enabled them to provide a condensed and easy to understand coverage of business law principles and areas of interest related thereto.

Diplomacy


Harold Nicolson - 1939
    The historical development of diplomacy is traced from primitive origins (when, hypothetically, the concept of diplomatic immunity arose from the realization that it was impractical to kill and eat an emissary before he had delivered his message), to modern times, when diplomatic procedure has become highly sophisticated and is controlled by strict conventions. Sir Harold also describes the ideal diplomatist, the varying types of European diplomacy, and recent changes in diplomatic procedure. The remodeled British diplomatic service has been analyzed in the revised chapter dealing with "The Foreign Service." The chapter on "Diplomatic Language" includes a glossary of words and phrases currently employed in diplomatic usage. An epilogue, added to this third edition, discusses the changes that have occurred in the field in post-war times, and refutes some of the the basic contentions of "The Ugly American" view of diplomacy.Sir Harold Nicolson, author and critic, was formerly with the British diplomatic service, and is considered an authority on diplomatic problems and procedure. Some of his other books are: The English Sense of Humour; King George V, His Life and Reign; and The Age of Reason.

Breakdown: The Inside Story of the Rise and Fall of Heenan Blaikie


Norman Bacal - 2017
    When it collapsed in February 2014, lawyers across Canada and the business community were stunned. What went wrong? Why did so many lawyers run for the exit? How did it implode? What is it that holds professional partnerships together?This is the story of the rise and fall of a great company by the ultimate insider, Norman Bacal, who served as managing partner until a year before the firm's demise. Breakdown takes readers into the boardroom offices during the heady growth of a legal empire built from the ground up over 40 years. We see how after a change of leadership tensions erupted between the Toronto and Montreal offices, and between the hard-driving lawyers themselves. It is a story about the extraordinary fragility of the legal partnership, but it's also a classic business story, a cautionary tale of the perils of ignoring a firm's culture and vision.Normal0falsefalsefalseEN-USJAX-NONE<!--StartFragment--><!--EndFragment--><!--EndFragment-->

DarkMarket: Cyberthieves, Cybercops and You


Misha Glenny - 2011
    The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.

Terror and Consent: The Wars for the Twenty-First Century


Philip Bobbitt - 2008
    In this book Philip Bobbitt brings together historical, legal, and strategic analyses to understand the idea of a “war on terror.” Does it make sense? What are its historical antecedents? How would such a war be “won”? What are the appropriate doctrines of constitutional and international law for democracies in such a struggle?He provocatively declares that the United States is the chief cause of global networked terrorism because of overwhelming American strategic dominance. This is not a matter for blame, he insists, but grounds for reflection on basic issues. We have defined the problem of winning the fight against terror in a way that makes the situation virtually impossible to resolve. We need to change our ideas about terrorism, war, and even victory itself.Bobbitt argues that the United States has ignored the role of law in devising its strategy, with fateful consequences, and has failed to reform law in light of the changed strategic context. Along the way he introduces new ideas and concepts—Parmenides’ Fallacy, the Connectivity Paradox, the market state, and the function of terror as a by-product of globalization—to help us prepare for what may be a decades-long conflict of which the battle against al Qaeda is only the first instance.At stake is whether we can maintain states of consent in the twenty-first century or whether the dominant constitutional order will be that of states of terror. Challenging, provocative, and insightful, Terror and Consent addresses the deepest themes of governance, liberty, and violence. It will change the way we think about confronting terror—and it will change the way we evaluate public policies in that struggle.