We Are All Targets


Book Description

The incredible untold origin story of cyberwar and the hackers who unleashed it on the world, tracing their journey from the ashes of the Cold War to the criminal underworld, governments, and even Silicon Valley. Two years before 9/11, the United States was attacked by an unknown enemy. No advance warning was given, and it didn't target civilians. Instead, tomahawk missiles started missing their targets, US agents were swept up by hostile governments, and America’s enemies seemed to know its every move in advance. A new phase of warfare—cyber war—had arrived. And within two decades it escaped Pandora's Box, plunging us into a state of total war where every day, countless cyber attacks perpetrated by states and mercenaries are reshaping the world. After receiving an anonymous email with leaked NATO battle plans during the bombardment of Kosovo, journalist Matt Potter embarked on a twenty-year investigation into the origins of cyber war and how it came to dominate the world. He uncovered its beginnings – worthy of a Bond movie – in the last days of the Cold War, as the US and its allies empowered a generation of Eastern European hackers, only to wake up in the late 90s to a new world order. It's a story that winds through Balkan hacking culture, Russia, Silicon Valley, and the Pentagon, introducing us to characters like a celebrity hacker with missing fingers who keeps escaping prison, FBI agents chasing the first generation of cyber mercenaries in the 90s, tech CEOs, and Russian generals obsessed with a Cold War rematch. Never before told, this is the riveting secret history of cyberwar not as governments want it to be – controlled, military-directed, discreet, and sophisticated – but as it really is: anarchic, chaotic, dangerous, and often thrilling.




This Is How They Tell Me the World Ends


Book Description

WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying exposé' The Times 'Part John le Carré . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable. Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.




Perfect Targets


Book Description

A 2002 study from Comprehensive Issues in Pediatric Nursing found that 94 percent of students with Asperger Syndrome face torment from their peers. Indeed, some of their behaviors and characteristics that others see as "different" make many of these children easy targets for frequent and severe bullying. This book takes a frank look at the different types of bullying and what adults must do to curb bullying, helping prevent the often lifelong effects of this behavior on its victims. Practical strategies and solutions at the school, class and individual level are presented.




Cyber War


Book Description

Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security—and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. This is the first book about the war of the future—cyber war—and a convincing argument that we may already be in peril of losing it.




Sandworm


Book Description

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.




Learning Targets


Book Description

In Learning Targets, Connie M. Moss and Susan M. Brookhart contend that improving student learning and achievement happens in the immediacy of an individual lesson--what they call "today's lesson"—or it doesn't happen at all. The key to making today's lesson meaningful? Learning targets. Written from students' point of view, a learning target describes a lesson-sized chunk of information and skills that students will come to know deeply. Each lesson's learning target connects to the next lesson's target, enabling students to master a coherent series of challenges that ultimately lead to important curricular standards. Drawing from the authors' extensive research and professional learning partnerships with classrooms, schools, and school districts, this practical book - Situates learning targets in a theory of action that students, teachers, principals, and central-office administrators can use to unify their efforts to raise student achievement and create a culture of evidence-based, results-oriented practice. - Provides strategies for designing learning targets that promote higher-order thinking and foster student goal setting, self-assessment, and self-regulation. - Explains how to design a strong performance of understanding, an activity that produces evidence of students' progress toward the learning target. - Shows how to use learning targets to guide summative assessment and grading. Learning Targets also includes reproducible planning forms, a classroom walk-through guide, a lesson-planning process guide, and guides to teacher and student self-assessment. What students are actually doing during today's lesson is both the source of and the yardstick for school improvement efforts. By applying the insights in this book to your own work, you can improve your teaching expertise and dramatically empower all students as stakeholders in their own learning.




Three Felonies a Day


Book Description

"The average professional in this country wakes up in the morning, goes to work, comes home, eats dinner and then goes to sleep, unaware that he or she has likely committted several federal crimes that day ... Why?" This book explores the answer to the question, reveals how the federal criminal justice system has become dangerously disconnected from common law traditions of due process and the law's expectations and surprises the reader with its insight.




Targets of Hatred


Book Description

Targets of Hatred charts the development of the anti-abortion movement in North America. Beginning in the years preceding the 1973 Roe vs. Wade decision that legalized abortion, the book examines the roles played by the Catholic Church, Fundamentalist Protestants, and Republican and Democratic parties, and assesses points of overlap and divergence. The voices of more than 190 providers in the United States and Canada--clinic owners, doctors, nurses, technicians, and their families--give readers an in-depth look at what it means to work in a field in which arson, bombings, harassment, and killing are routine. Filled with dramatic, eye-witness accounts of anti-abortion terrorism, the book demonstrates law enforcement's failure to stem the violence and is a call to arms for concerned individuals.




Dawn of the Code War


Book Description

The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us. In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.




The Hacked World Order


Book Description

For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.