Author: Kim Zetter
Release Date: 2014-11-11
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.
Author: Susan Landau
Publisher: Yale University Press
Release Date: 2017-11-28
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
Author: Ben Buchanan
Publisher: Oxford University Press
Release Date: 2017-02-01
Genre: Political Science
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Author: John A. Adams, Jr.
Release Date: 2015-03-12
With over 140 countries fielding nation-state and rouge malious cyber hacking capabilities, it is critical that we are aware of threats and vulnerabilities. Adm. Michael Rogers, director of the National Security Agency warned Congress regarding cyber attacks, "It's only a matter of the 'when, ' not the 'if, ' that we are going to see something dramatic." Cyber Blackout is a warning. It is a chronicle of the cyber threats of which we find ourselves at risk every day. Our power supply is vulnerable. Our food supply. Even the basics of communication. Every facet of our national security is vulnerable to cyber threats, and we are not prepared to defend them all. Cyber Blackout explains how these threats have been building since the Cold War, how they affect us now, and how they are changing the concepts of war and peace as we know them. It is essential knowledge for anyone wishing to understand safety and security in the age of the fifth domain....
What would you do to bring hope to your dying son or daughter afflicted with leukemia? Would you permit your son or daughter to experience life while facing their expected death? Emily was twelve when diagnosed with leukemia. She met seventeen year old Jeremy who would become her anchor to give her strength when she was weak; to give her hope when she felt all was lost; and to give her unqualified love and support to hold onto when she was lost, frightened or simply unable to do for herself. Emily wanted to experience life before she faced her own death. Emilys mother reluctantly allowed her to secretly marry Jeremy before God and in her presence since underage marriage was forbidden by society. Emilys story was told in the book titled Emily. Emily brought hope to young cancer patients who simply want to experience life before facing their probable death. This book chronicles Emily and Jeremys fight to change the rules and allow qualifying sick children to marry and experience life before facing death. Emily states, Is that really so much to ask? Child Welfare says, Yes it is. Underage girls can marry if they are pregnant, but underage sick and dying children should never be permitted to marry unless the cancer patient gets pregnant. See who prevails in this battle to bring life and dignity to young cancer patients who just want to live, even if living is but a moment in time.
A simple trip home for the holidays is all former FBI profiler Maggie Mason wants. But a serial killer has other plans. Trapped in a deadly game of cat and mouse, Maggie finds an ally in Lost, Inc. with private investigator Dr. Ian Crane. The handsome widower is reluctant to love again, and the last thing Maggie wants is to put Ian in the line of fire, too. Love could cost them everything…unless they can find their way to each other, in time for Christmas.
Author: Jeremiah D. Jackson
Publisher: Xlibris Corporation
Release Date: 2010-10-21
Genre: Biography & Autobiography
The Flight of the Feral Chihuahua is a true story about the effort, challenges, and fears behind setting a new round-trip transcontinental speed record in a small airplane. The author a long-time pilot and accomplished skydiver brings to the reader a vivid re-telling of modifying his home-built, experimental airplane, and then flying it 4,200 miles one winters day across the United States and back. Challenging him along the way were hours of fatigue, deep isolation, dangerous weather, and life-threatening equipment failures. But, off-setting these challenges were months of planning, state-of-art equipment, extensive training, and the love and prayers of friends and family. No matter what the readers background, this book will leave you with a sense of being there through realistic imagery and a detailed description of what the pilot saw, felt, and thought along the way.
Countdown: A Joe Ledger Prequel Short Story to Patient Zero "I didn't plan to kill anyone. I wasn't totally against the idea, either. Sometimes things just fall that way, and either you roll with it or it rolls over you. Letting the bad guys win isn't how I roll." Meet Joe Ledger, Baltimore PD, attached to a Homeland task force... who's about to get a serious promotion.
Author: E. R. Mason
Publisher: ER Mason
Release Date: 2011-04-12
“I have never believed in going strictly by the book. My six-foot-two frame has an assortment of scars and marks that readily attest to that. It’s the main reason I’ve never been offered a higher position on a big-draft. But, when things really go to hell, I’m always the first one to get the call. They trust me with their lives, but not their jobs.” --Adrian Tarn, Chief Security Officer, Starship Electra
Author: Shayler David
Publisher: Springer Science & Business Media
Release Date: 2000-05-17
Here, Dave Shayler examines the hurdles faced by space crews as they prepare and embark on space missions. Divided into six parts, the text opens with the fateful, tragic mission of the Challenger crew in 1986. This is followed by a review of the risks that accompany every space trip and the unique environment in which the space explorer lives and works. The next four sections cover the four parts of any space flight (training, launch, in-flight and recovery) and present major historical incidents in each case. The final section looks at the next forty years beyond the Earth's atmosphere, beginning with the International Space Station and moving on to the difficulties inherent in a manned exploration of Mars.
Author: George E. Lowe
Publisher: Xlibris Corporation
Release Date: 2013-12-16
Volume 1 of Stalking the Antichrists and Their False Nuclear Prophets, Nuclear Gladiators, and Spirit Warriors,1940-1965 is essentially an enhanced memoir. It is based for the most part on my personal observations and knowledge and specialized information from my academic studies of history, political science, and literature at Grove City College and the University of Chicago,as well as my professional insights into the heart of the U. S. Navy (1953-1957, 1960-1961[OP- 09D]) as an Air Intelligence Officer in Hawaii and Japan and the Pentagon; political- military/counsellor assignments in the State Department as a Foreign Service Officer(FSO-6) at the American embassy in Paris (1962-64); and a speechwriter in the Navy Department (1965). In volume 2, the textual narrative begins with the end of my specific actions/ activities in the Navy and Foreign Service in July 1965, which I have called How I Lived in History, 1950-1965. In retrospect my entire Navy careerfrom my commissioning as Ensign USNR, 1355 AIO, in early September 1953 at Naval Station, Newport, Rhode Island, to my first honorable discharge at Treasure Island on August 27, 1957was in preparation to an understanding of World War II and the Cold War.