Book picks similar to
The Cybersecurity Dilemma: Network Intrusions, Trust, and Fear in the International System by Ben Buchanan
cybersecurity
technology
nonfiction
cyber
The Chinese Invasion Threat: Taiwan's Defense and American Strategy in Asia
Ian Easton - 2017
From a historic spy case that saved Taiwan from communist takeover to modern day covert action programs, and from emergency alert procedures to underground coastal defense networks, this is the untold story of the most dangerous flashpoint of our times.""Easton offers a brilliant, thick description of China's invasion plans, Taiwan's plans to repel an invasion, potential invasion scenarios, and how the U.S. might respond. Throughout the incredible level of detail, and the vast number of plans, locations, weapons systems, operations and doctrines it presents, Easton's clarity of order and logical presentation keep everything firmly under control.Where would it arrive? When would it come? How would China attack Taiwan?Easton paints the way the island-nation would be attacked with a fine calligraphy brush, detailing how the landings would go, what would happen if the PRC got a foothold, and what weapons would be deployed where and how."Democratic-ruled Taiwan poses an existential threat to China's communist leaders because the island, located some 90 miles off the southeast coast "serves as a beacon of freedom for ethnically Chinese people everywhere," the book states."What Easton has done is provide a vital warning to America and its allies, China could try to invade Taiwan as early as the first half of the next decade."Easton is a Washington-based think tank Project 2049 Institute research fellow and a former National Chengchi University student.
Kings and Presidents: Inside the Special Relationship Between Saudi Arabia and America Since FDR
Bruce Riedel - 2017
Subsequent U.S. presidents have had direct relationships with those kings and their successors--setting the tone for a special partnership between an absolute monarchy with a unique Islamic identity and the world's most powerful democracy. Although based in large part on economic interests, the U.S.-Saudi relationship has rarely been smooth. Differences over Israel have caused friction since the early days, and ambiguities about Saudi involvement--or lack of it--in the September 11 terrorist attacks against the United States continue to haunt the relationship. Now, both countries have new, still-to be-tested leaders in President Trump and King Salman. Bruce Riedel for decades has followed these kings and presidents during his career at the CIA, the White House, and Brookings. This book offers an insider's account of the U.S.-Saudi relationship, with unique insights. Using declassified documents, memoirs by both Saudis and Americans, and eyewitness accounts, this book takes the reader inside the royal palaces, the holy cities, and the White House to gain an understanding of this complex partnership.
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government
David Talbot - 2015
Drawing on revelatory new materials—including newly discovered U.S. government documents, U.S. and European intelligence sources, the personal correspondence and journals of Allen Dulles’s wife and mistress, and exclusive interviews with the children of prominent CIA officials—Talbot reveals the underside of one of America’s most powerful and influential figures.Dulles’s decade as the director of the CIA—which he used to further his public and private agendas—were dark times in American politics. Calling himself “the secretary of state of unfriendly countries,” Dulles saw himself as above the elected law, manipulating and subverting American presidents in the pursuit of his personal interests and those of the wealthy elite he counted as his friends and clients—colluding with Nazi-controlled cartels, German war criminals, and Mafiosi in the process. Targeting foreign leaders for assassination and overthrowing nationalist governments not in line with his political aims, Dulles employed those same tactics to further his goals at home, Talbot charges, offering shocking new evidence in the assassination of President John F. Kennedy.An exposé of American power that is as disturbing as it is timely, The Devil’s Chessboard is a provocative and gripping story of the rise of the national security state—and the battle for America’s soul.
Gray Day: My Undercover Mission to Expose America's First Cyber Spy
Eric O'Neill - 2019
With zero training in face-to-face investigation, O'Neill found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies--and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a fondness for handguns. In the months that follow, O'Neill's self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches O'Neill the game of spycraft. The student will just have to learn to outplay his teacher if he wants to win.A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage--and how we might begin to catch up.
The Square and the Tower: Networks and Power, from the Freemasons to Facebook
Niall Ferguson - 2017
It's about states, armies and corporations. It's about orders from on high. Even history "from below" is often about trade unions and workers' parties. But what if that's simply because hierarchical institutions create the archives that historians rely on? What if we are missing the informal, less well documented social networks that are the true sources of power and drivers of change?The 21st century has been hailed as the Age of Networks. However, in The Square and the Tower, Niall Ferguson argues that networks have always been with us, from the structure of the brain to the food chain, from the family tree to freemasonry. Throughout history, hierarchies housed in high towers have claimed to rule, but often real power has resided in the networks in the town square below. For it is networks that tend to innovate. And it is through networks that revolutionary ideas can contagiously spread. Just because conspiracy theorists like to fantasize about such networks doesn't mean they are not real.From the cults of ancient Rome to the dynasties of the Renaissance, from the founding fathers to Facebook, The Square and the Tower tells the story of the rise, fall and rise of networks, and shows how network theory--concepts such as clustering, degrees of separation, weak ties, contagions and phase transitions--can transform our understanding of both the past and the present.Just as The Ascent of Money put Wall Street into historical perspective, so The Square and the Tower does the same for Silicon Valley. And it offers a bold prediction about which hierarchies will withstand this latest wave of network disruption--and which will be toppled.
The Great War for Civilisation: The Conquest of the Middle East
Robert Fisk - 2005
A book of searing drama as well as lucid, incisive analysis, The Great War for Civilisation is a work of major importance for today's world.
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Clint Watts - 2018
In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Putin's Wars: The Rise of Russia's New Imperialism
Marcel H. Van Herpen - 2014
Drawing on extensive original Russian sources, Marcel H. Van Herpen analyzes in detail how Putin's wars were prepared and conducted and why they led to allegations of war crimes and genocide. He shows how the conflicts functioned to consolidate and legitimate Putin's regime and explores how they were connected to a third, hidden, "internal war" waged by the Kremlin against the opposition. The author convincingly argues that the Kremlin--relying on the secret services, the Orthodox Church, the Kremlin youth "Nashi," and the rehabilitated Cossacks--is preparing for an imperial revival, most recently in the form of a "Eurasian Union." An essential book for understanding the dynamics of Putin's regime, this study digs deep into the Kremlin's secret long-term strategies. Readable and clearly argued, it makes a compelling case that Putin's regime emulates an established Russian paradigm in which empire building and despotic rule are mutually reinforcing. As the first comprehensive exploration of the historical antecedents and political continuity of the Kremlin's contemporary policies, Van Herpen's work will make a valuable contribution to the literature on post-Soviet Russia, and his arguments will stimulate vigorous debate.
How to Lose the Information War: Russia, Fake News and the Future of Conflict
Nina Jankowicz - 2020
The question no one seems to be able to answer is: what can the West do about it?Central and Eastern European states, however, have been aware of the threat for years. Nina Jankowicz has advised these governments on the front lines of the information war. The lessons she learnt from that fight, and from her attempts to get US congress to act, make for essential reading.How to Lose the Information War takes the reader on a journey through five Western governments' responses to Russian information warfare tactics - all of which have failed. She journeys into the campaigns the Russian operatives run, and shows how we can better understand the motivations behind these attacks and how to beat them. Above all, this book shows what is at stake: the future of civil discourse and democracy, and the value of truth itself.
Intel Wars: The Secret History of the Fight Against Terror
Matthew M. Aid - 2012
Five hundred billion dollars of spending in the Bush-Cheney years turned the U.S. spy network into a monster: 200,000-plus employees, stations in 170 countries, and an annual budget of more than $75 billion. Armed with cutting-edge surveillance gear, high-tech weapons, and fleets of armed and unarmed drone aircraft, America deploys the most advanced intel force in history. But even after the celebrated strike against Osama Bin Laden, America's spies are still struggling to beat a host of ragtag enemies around the world. In Intel Wars, preeminent secrecy and intelligence historian Matthew Aid ("our reigning expert on the NSA"-Seymour M. Hersh) delivers the inside stories of how and why our shadow war against extremism has floundered. Spendthrift, schizophrenic policies leave next-generation spy networks drowning in raw data, resource-starved, and choked on paperwork. Overlapping jurisdictions stall CIA operatives, who wait seventy-two hours for clearance to attack fast-moving Taliban IE D teams. U.S. military computers-their classified hard drives still in place-turn up for sale at Afghan bazaars. Swift, tightly focused operations like the Bin Laden strike are the exception rather than the rule. Intel Wars-based on extensive, on-the-ground interviews, and revelations from Wikileaks cables and other newly declassified documents-shows how our soldier-spies are still fighting to catch up with the enemy. Matthew Aid captures the lumbering behemoth that is the U.S. military-intelligence complex in one comprehensive narrative, and distills the unprecedented challenges to our security into a compelling- and sobering-read.
Causes of War
Jack S. Levy - 2009
Written by leading scholars in the field, "Causes of War" provides the first comprehensive analysis of the leading theories relating to the origins of both interstate and civil wars.Utilizes historical examples to illustrate individual theories throughoutIncludes an analysis of theories of civil wars as well as interstate wars -- one of the only texts to do bothWritten by two former International Studies Association Presidents