Security in the Cyber Age


Book Description

Explore how cyberspace works, analyze how state and non-state actors exploit vulnerabilities, and discover ways to improve cybersecurity.




Unpresidented


Book Description

A riveting, meticulously researched, and provocative biography of Donald J. Trump from the author of Alexander Hamilton, Revolutionary. Born into a family of privilege and wealth, he was sent to military school at the age of 13. After an unremarkable academic career, he joined the family business in real estate and built his fortune. His personal brand: sex, money and power. From no-holds-barred reality TV star to unlikely candidate, Donald J. Trump rose to the highest political office: President of the United States of America. Learn fascinating details about his personal history, including: -Why Trump’s grandfather left Germany and immigrated to America -Why Woodie Guthrie wrote a song criticizing Trump’s father -How Trump’s romance with Ivana began—and ended -When Trump first declared his interest in running for President Discover the incredible true story of America’s 45th President: his questionable political and personal conduct, and his unprecedented rise to power. Richly informed by original research and illustrated throughout with photographs and documents, Unpresidented is a gripping and important read.




Attribution of Advanced Persistent Threats


Book Description

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.




Securing the Vote


Book Description

During the 2016 presidential election, America's election infrastructure was targeted by actors sponsored by the Russian government. Securing the Vote: Protecting American Democracy examines the challenges arising out of the 2016 federal election, assesses current technology and standards for voting, and recommends steps that the federal government, state and local governments, election administrators, and vendors of voting technology should take to improve the security of election infrastructure. In doing so, the report provides a vision of voting that is more secure, accessible, reliable, and verifiable.




Cyber Operations and International Law


Book Description

This book offers a comprehensive overview of the international law applicable to cyber operations. It is grounded in international law, but is also of interest for non-legal researchers, notably in political science and computer science. Outside academia, it will appeal to legal advisors, policymakers, and military organisations.




Review of Four FISA Applications and Other Aspects of the FBI's Crossfire Hurricane Investigation


Book Description

The Department of Justice (Department) Office of the Inspector General (OIG) undertook this review to examine certain actions by the Federal Bureau of Investigation (FBI) and the Department during an FBI investigation opened on July 31, 2016, known as "Crossfire Hurricane," into whether individuals associated with the Donald J. Trump for President Campaign were coordinating, wittingly or unwittingly, with the Russian government's efforts to interfere in the 2016 U.S. presidential election. Our review included examining: - The decision to open Crossfire Hurricane and four individual cases on current and former members of the Trump campaign, George Papadopoulos, Carter Page, Paul Manafort, and Michael Flynn; the early investigative steps taken; and whether the openings and early steps complied with Department and FBI policies; - The FBI's relationship with Christopher Steele, whom the FBI considered to be a confidential human source (CHS); its receipt, use, and evaluation of election reports from Steele; and its decision to close Steele as an FBI CHS; - Four FBI applications filed with the Foreign Intelligence Surveillance Court (FISC) in 2016 and 2017 to conduct Foreign Intelligence Surveillance Act (FISA) surveillance targeting Carter Page; and whether these applications complied with Department and FBI policies and satisfied the government's obligations to the FISC; - The interactions of Department attorney Bruce Ohr with Steele, the FBI, Glenn Simpson of Fusion GPS, and the State Department; whether work Ohr's spouse performed for Fusion GPS implicated ethical rules applicable to Ohr; and Ohr's interactions with Department attorneys regarding the Manafort criminal case; and - The FBI's use of Undercover Employees (UCEs) and CHSs other than Steele in the Crossfire Hurricane investigation; whether the FBI placed any CHSs within the Trump campaign or tasked any CHSs to report on the Trump campaign; whether the use of CHSs and UCEs complied with Department and FBI policies; and the attendance of a Crossfire Hurricane supervisory agent at counterintelligence briefings given to the 2016 presidential candidates and certain campaign advisor




Governing Cyberspace


Book Description

Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does international law regulate state behaviour and what are its limits? How do cyber superpowers like China and Russia shape their foreign policy in relation to cyberspace? The second focuses on power and governance. What is the role for international organisations like NATO or for substate actors like intelligence agencies? How do they adapt to the realities of cyberspace and digital conflict? How does the classic balance of power play out in cyberspace and how do different states position themselves? The third part takes a critical look at multistakeholder and corporate diplomacy. How do global tech companies shape their role as norm entrepreneurs in cyberspace, and how do their cyber diplomatic efforts relate to their corporate identity?




Assessing Russian Activities and Intentions in Recent Us Elections


Book Description

This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow's intentions regarding US elections and Moscow's use of cyber tools and media campaigns to influence US public opinion. The assessment focuses on activities aimed at the 2016 US presidential election and draws on our understanding of previous Russian influence operations. When we use the term "we" it refers to an assessment by all three agencies. * This report is a declassified version of a highly classified assessment. This document's conclusions are identical to the highly classified assessment, but this document does not include the full supporting information, including specific intelligence on key elements of the influence campaign. Given the redactions, we made minor edits purely for readability and flow. We did not make an assessment of the impact that Russian activities had on the outcome of the 2016 election. The US Intelligence Community is charged with monitoring and assessing the intentions, capabilities, and actions of foreign actors; it does not analyze US political processes or US public opinion. * New information continues to emerge, providing increased insight into Russian activities. * PHOTOS REMOVED




In Defense of Julian Assange


Book Description

"After being forcibly removed from the Ecuadorian Embassy, Julian Assange is now in a high security prison in London where he faces extradition to the United States and imprisonment for the rest of his life. The charges Assange faces are a major threat to press freedom. James Goodale, who represented the New York Times in the Pentagon Papers case, commented: The charge against Assange for conspiring with a source is the most dangerous I can think of with respect to the First Amendment in all my years representing media organizations. It is critical now to build support for Assange and prevent his delivery into the hands of the Trump administration. That is the urgent purpose of this book. A wide range of distinguished contributors, many of them in original pieces, here set out the story of Julian Assange and WikiLeaks, the importance of their work, and the dangers for us all in the persecution they face. In Defense of Julian Assange is a vivid, vital intervention into one of the most important political issues of our day.




The Future of Election Administration


Book Description

As the American election administration landscape changes as a result of major court cases, national and state legislation, changes in professionalism, and the evolution of equipment and security, so must the work of on-the-ground practitioners change. This Open Access title presents a series of case studies designed to highlight practical responses to these changes from the national, state, and local levels. This book is designed to be a companion piece to The Future of Election Administration, which surveys these critical dimensions of elections from the perspectives of the most forward-thinking practitioner, policy, advocacy, and research experts and leaders in these areas today. Drawing upon principles of professionalism and the practical work that is required to administer elections as part of the complex systems, this book lifts up the voices and experiences of practitioners from around the country to describe, analyze, and anticipate the key areas of election administration systems on which students, researchers, advocates, policy makers, and practitioners should focus. Together, these books add to the emerging body of literature that is part of the election sciences community with an emphasis on the practical aspects of administration.