Security in the Cyber Age


Book Description

Explore how cyberspace works, analyze how state and non-state actors exploit vulnerabilities, and discover ways to improve cybersecurity.




Unpresidented


Book Description

A riveting, meticulously researched, and provocative biography of Donald J. Trump from the author of Alexander Hamilton, Revolutionary. Born into a family of privilege and wealth, he was sent to military school at the age of 13. After an unremarkable academic career, he joined the family business in real estate and built his fortune. His personal brand: sex, money and power. From no-holds-barred reality TV star to unlikely candidate, Donald J. Trump rose to the highest political office: President of the United States of America. Learn fascinating details about his personal history, including: -Why Trump’s grandfather left Germany and immigrated to America -Why Woodie Guthrie wrote a song criticizing Trump’s father -How Trump’s romance with Ivana began—and ended -When Trump first declared his interest in running for President Discover the incredible true story of America’s 45th President: his questionable political and personal conduct, and his unprecedented rise to power. Richly informed by original research and illustrated throughout with photographs and documents, Unpresidented is a gripping and important read.




Securing the Vote


Book Description

During the 2016 presidential election, America's election infrastructure was targeted by actors sponsored by the Russian government. Securing the Vote: Protecting American Democracy examines the challenges arising out of the 2016 federal election, assesses current technology and standards for voting, and recommends steps that the federal government, state and local governments, election administrators, and vendors of voting technology should take to improve the security of election infrastructure. In doing so, the report provides a vision of voting that is more secure, accessible, reliable, and verifiable.




Attribution of Advanced Persistent Threats


Book Description

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.




Cyber Operations and International Law


Book Description

This book offers a comprehensive overview of the international law applicable to cyber operations. It is grounded in international law, but is also of interest for non-legal researchers, notably in political science and computer science. Outside academia, it will appeal to legal advisors, policymakers, and military organisations.




Governing Cyberspace


Book Description

Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity?




In Defense of Julian Assange


Book Description

"After being forcibly removed from the Ecuadorian Embassy, Julian Assange is now in a high security prison in London where he faces extradition to the United States and imprisonment for the rest of his life. The charges Assange faces are a major threat to press freedom. James Goodale, who represented the New York Times in the Pentagon Papers case, commented: The charge against Assange for conspiring with a source is the most dangerous I can think of with respect to the First Amendment in all my years representing media organizations. It is critical now to build support for Assange and prevent his delivery into the hands of the Trump administration. That is the urgent purpose of this book. A wide range of distinguished contributors, many of them in original pieces, here set out the story of Julian Assange and WikiLeaks, the importance of their work, and the dangers for us all in the persecution they face. In Defense of Julian Assange is a vivid, vital intervention into one of the most important political issues of our day.




The Future of Election Administration


Book Description

As the American election administration landscape changes as a result of major court cases, national and state legislation, changes in professionalism, and the evolution of equipment and security, so must the work of on-the-ground practitioners change. This Open Access title presents a series of case studies designed to highlight practical responses to these changes from the national, state, and local levels. This book is designed to be a companion piece to The Future of Election Administration, which surveys these critical dimensions of elections from the perspectives of the most forward-thinking practitioner, policy, advocacy, and research experts and leaders in these areas today. Drawing upon principles of professionalism and the practical work that is required to administer elections as part of the complex systems, this book lifts up the voices and experiences of practitioners from around the country to describe, analyze, and anticipate the key areas of election administration systems on which students, researchers, advocates, policy makers, and practitioners should focus. Together, these books add to the emerging body of literature that is part of the election sciences community with an emphasis on the practical aspects of administration.