Book picks similar to
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan
cyber
technology
politics
non-fiction
iWar: War and Peace in the Information Age
Bill Gertz - 2017
Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
Future Crimes
Marc Goodman - 2015
Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services. Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders. With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment. Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.From the Hardcover edition.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Paul Rosenzweig - 2013
Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses
Crashback: The Power Clash Between the U.S. and China in the Pacific
Michael Fabey - 2017
It is a “warm war,” a shoving match between the United States, since WWII the uncontested ruler of the seas, and China, which now possesses the world’s largest navy. The Chinese regard the Pacific, and especially the South China Sea, as their ocean, and they’re ready to defend it. Each day the heat between the two countries increases as the Chinese try to claim the South China Sea for their own, and the United States insists on asserting freedom of navigation. Throughout Southern Asia, countries such as Vietnam, Malaysia, the Philippines, Singapore, and South Korea respond with outrage and growing fear as China turns coral reefs into manmade islands capable of supporting airstrips and then attempts to enforce twelve-mile-radius, shoot-down zones. The immediate danger is that the five trillion dollars in international trade that passes through the area will grind to a standstill. The ultimate danger is that the US and China will be drawn into all-out war. Pulitzer Prize-nominated journalist Michael Fabey has had unprecedented access to the Navy’s most exotic aircraft carriers, cruisers, destroyers, aircraft, and submarines, as well as those who command them. He was among the only journalists allowed to board a Chinese war vessel and observe its operations. In Crashback, Fabey describes how every year the US is “losing sea.” He predicts the next great struggle between military superpowers will play out in the Pacific, and his book, more than any other, is an accurate preview of how that conflict might unfold.
Playing to the Edge: American Intelligence in the Age of Terror
Michael V. Hayden - 2016
Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years? What was NSA before 9/11 and how did it change in its aftermath? Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? As Director of CIA in the last three years of the Bush administration, Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict. For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman - 2014
This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government
David Talbot - 2015
Drawing on revelatory new materials—including newly discovered U.S. government documents, U.S. and European intelligence sources, the personal correspondence and journals of Allen Dulles’s wife and mistress, and exclusive interviews with the children of prominent CIA officials—Talbot reveals the underside of one of America’s most powerful and influential figures.Dulles’s decade as the director of the CIA—which he used to further his public and private agendas—were dark times in American politics. Calling himself “the secretary of state of unfriendly countries,” Dulles saw himself as above the elected law, manipulating and subverting American presidents in the pursuit of his personal interests and those of the wealthy elite he counted as his friends and clients—colluding with Nazi-controlled cartels, German war criminals, and Mafiosi in the process. Targeting foreign leaders for assassination and overthrowing nationalist governments not in line with his political aims, Dulles employed those same tactics to further his goals at home, Talbot charges, offering shocking new evidence in the assassination of President John F. Kennedy.An exposé of American power that is as disturbing as it is timely, The Devil’s Chessboard is a provocative and gripping story of the rise of the national security state—and the battle for America’s soul.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
The Quest: Energy, Security, and the Remaking of the Modern World
Daniel Yergin - 2011
A master storyteller as well as a leading energy expert, Yergin shows us how energy is an engine of global political and economic change. It is a story that spans the energies on which our civilization has been built and the new energies that are competing to replace them. From the jammed streets of Beijing to the shores of the Caspian Sea, from the conflicts in the Mideast to Capitol Hill and Silicon Valley, Yergin takes us into the decisions that are shaping our future.The drama of oil-the struggle for access, the battle for control, the insecurity of supply, the consequences of use, its impact on the global economy, and the geopolitics that dominate it-continues to profoundly affect our world.. Yergin tells the inside stories of the oil market and the surge in oil prices, the race to control the resources of the former Soviet empire, and the massive mergers that transformed the landscape of world oil. He tackles the toughest questions: Will we run out of oil? Are China and the United States destined to come into conflict over oil? How will a turbulent Middle East affect the future of oil supply?Yergin also reveals the surprising and sometimes tumultuous history of nuclear and coal, electricity, and the "shale gale" of natural gas, and how each fits into the larger marketplace. He brings climate change into unique perspective by offering an unprecedented history of how the field of climate study went from the concern of a handful of nineteenth- century scientists preoccupied with a new Ice Age into one of the most significant issues of our times.He leads us through the rebirth of renewable energies and explores the distinctive stories of wind, solar, and biofuels. He offers a perspective on the return of the electric car, which some are betting will be necessary for a growing global economy.The Quest presents an extraordinary range of characters and dramatic stories that illustrate the principles that will shape a robust and flexible energy security system for the decades to come. Energy is humbling in its scope, but our future requires that we deeply understand this global quest that is truly reshaping our world.
The Dead Hand: The Untold Story of the Cold War Arms Race and its Dangerous Legacy
David E. Hoffman - 2009
In the last half of the twentieth century the two superpowers had perfected the science of mass destruction and possessed nuclear weapons with the combined power of a million Hiroshimas. What’s more, a Soviet biological warfare machine was ready to produce bacteria and viruses to sicken and kill millions. In The Dead Hand, a thrilling narrative history drawing on new archives and original research and interviews, David E. Hoffman reveals how presidents, scientists, diplomats, soldiers, and spies confronted the danger and changed the course of history. The Dead Hand captures the inside story in both the United States and the Soviet Union, giving us an urgent and intimate account of the last decade of the arms race. With access to secret Kremlin documents, Hoffman chronicles Soviet internal deliberations that have long been hidden. He reveals that weapons designers in 1985 laid a massive “Star Wars” program on the desk of Soviet leader Mikhail Gorbachev to compete with President Reagan, but Gorbachev refused to build it. He unmasks the cover-up of the Soviet biological weapons program. He tells the exclusive story of one Soviet microbiologist’s quest to build a genetically engineered super-germ—it would cause a mild illness, a deceptive recovery, then a second, fatal attack. And he details the frightening history of the Doomsday Machine, known as the Dead Hand, which would launch a retaliatory nuclear strike if the Soviet leaders were wiped out. When the Soviet Union collapsed, the dangers remained. Soon rickety trains were hauling unsecured nuclear warheads across the Russian steppe; tons of highly-enriched uranium and plutonium lay unguarded in warehouses; and microbiologists and bomb designers were scavenging for food to feed their families. The Dead Hand offers fresh and startling insights into Reagan and Gorbachev, the two key figures of the end of the Cold War, and draws colorful, unforgettable portraits of many others who struggled, often valiantly, to save the world from the most terrifying weapons known to man.
Arms and Influence
Thomas C. Schelling - 1967
Schelling considers the ways in which military capabilities—real or imagined—are used as bargaining power. This edition contains a new foreword by the author where he considers the book’s relevance over forty years after its first publication. Included as an afterword is the text of Professor Schelling’s Nobel acceptance speech in which he reflects upon the global taboo that has emerged against nuclear weapons since Hiroshima."This is a brilliant and hardheaded book. It will frighten those who prefer not to dwell on the unthinkable and infuriate those who have taken refuge in stereotypes and moral attitudinizing."—Gordon A. Craig, New York Times Book ReviewThomas C. Schelling is Distinguished University Professor, Department of Economics and School of Public Affairs, University of Maryland and Lucius N. Littauer Professor of Political Economy, Emeritus, Harvard University. He is co-recipient of the 2005 Nobel Prize in Economics. The Henry L. Stimson Lectures Series
Army of None: Autonomous Weapons and the Future of War
Paul Scharre - 2018
Today around the globe, at least thirty nations have weapons that can search for and destroy enemy targets all on their own. Paul Scharre, a leading expert in next-generation warfare, describes these and other high tech weapons systems—from Israel’s Harpy drone to the American submarine-hunting robot ship Sea Hunter—and examines the legal and ethical issues surrounding their use. “A smart primer to what’s to come in warfare” (Bruce Schneier), Army of None engages military history, global policy, and cutting-edge science to explore the implications of giving weapons the freedom to make life and death decisions. A former soldier himself, Scharre argues that we must embrace technology where it can make war more precise and humane, but when the choice is life or death, there is no replacement for the human heart.
The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online
Mary Aiken - 2016
Levitt, co-author of Freakonomics - One of the best books of the year--NatureMary Aiken, the world's leading expert in forensic cyberpsychology, offers a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, privacy, and our perception of the world. Drawing on her own research and extensive experience with law enforcement, Aiken covers a wide range of subjects, from the impact of screens on the developing child to the explosion of teen sexting and the acceleration of compulsive and addictive behaviors online. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.Praise for The Cyber Effect"How to guide kids in a hyperconnected world is one of the biggest challenges for today's parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives."--Peggy Orenstein, author of the New York Times bestseller Girls & Sex"[A] fresh voice and a uniquely compelling perspective that draws from the murky, fascinating depths of her criminal case file and her insight as a cyber-psychologist . . . This is Aiken's cyber cri de coeur as a forensic scientist, and she wants everyone on the case."--The Washington Post"Fascinating . . . If you have children, stop what you are doing and pick up a copy of The Cyber Effect."--The Times (UK)"An incisive tour of sociotechnology and its discontents."--Nature"Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time."--Bob Woodward"Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace."--John R. Suler, PhD, author of The Psychology of Cyberspace"Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense."--Steven D. Levitt"Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today's digital tools can be exploited by criminals lurking in the Internet's Dark Net."--Newsweek
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Clint Watts - 2018
In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.
Unrestricted Warfare: China's Master Plan to Destroy America
Qiao Liang - 1999
American military doctrine is typically led by technology; a new class of weapon or vehicle is developed, which allows or encourages an adjustment in strategy. Military strategists Qiao Liang and Wang Xiangsui argue that this dynamic is a crucial weakness in the American military, and that this blind spot with regard to alternative forms warfare could be effectively exploited by enemies. "Unrestricted Warfare" concerns the many ways in which this might occur, and, in turn, suggests what the United States might do to defend itself.The traditional mentality that offensive action is limited to military action is no longer adequate given the range of contemporary threats and the rising costs-both in dollars and lives lost-of traditional warfare. Instead, Liang and Xiangsui suggest the significance of alternatives to direct military confrontation, including international policy, economic warfare, attacks on digital infrastructure and networks, and terrorism. Even a relatively insignificant state can incapacitate a far more powerful enemy by applying pressure to their economic and political systems. Exploring each of these considerations with remarkable insight and clarity, "Unrestricted Warfare" is an engaging evaluation of our geopolitical future.