Black Dragon River

Author: Dominic Ziegler
Publisher: Penguin
ISBN: 0698410165
Format: PDF, ePub
Download Now
Black Dragon River is a personal journey down one of Asia’s great rivers that reveals the region’s essential history and culture. The world’s ninth largest river, the Amur serves as a large part of the border between Russia and China. As a crossroads for the great empires of Asia, this area offers journalist Dominic Ziegler a lens with which to examine the societies at Europe's only borderland with east Asia. He follows a journey from the river's top to bottom, and weaves the history, ecology and peoples to show a region obsessed with the past—and to show how this region holds a key to the complex and critical relationship between Russia and China today. One of Asia’s mightiest rivers, the Amur is also the most elusive. The terrain it crosses is legendarily difficult to traverse. Near the river’s source, Ziegler travels on horseback from the Mongolian steppe into the taiga, and later he is forced by the river’s impassability to take the Trans-Siberian Railway through the four-hundred-mile valley of water meadows inland. As he voyages deeper into the Amur wilderness, Ziegler also journeys into the history of the peoples and cultures the river’s path has transformed. The known history of the river begins with Genghis Khan and the rise of the Mongolian empire a millennium ago, and the story of the region has been one of aggression and conquest ever since. The modern history of the river is the story of Russia's push across the Eurasian landmass to China. For China, the Amur is a symbol of national humiliation and Western imperial land seizure; to Russia it is a symbol of national regeneration, its New World dreams and eastern prospects. The quest to take the Amur was to be Russia’s route to greatness, replacing an oppressive European identity with a vibrant one that faced the Pacific. Russia launched a grab in 1854 and took from China a chunk of territory equal in size nearly to France and Germany combined. Later, the region was the site for atrocities meted out on the Russian far east in the twentieth century during the Russian civil war and under Stalin. The long shared history on the Amur has conditioned the way China and Russia behave toward each other—and toward the outside world. To understand Putin’s imperial dreams, we must comprehend Russia’s relationship to its far east and how it still shapes the Russian mind. Not only is the Amur a key to Putinism, its history is also embedded in an ongoing clash of empires with the West.

Cyber Mercenaries

Author: Tim Maurer
Publisher: Cambridge University Press
ISBN: 1108580262
Format: PDF
Download Now
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Black Code

Author: Ronald J. Deibert
Publisher: Signal
ISBN: 0771025343
Format: PDF
Download Now
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors. This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.

Cyberspace in Peace and War

Author: Martin Libicki
Publisher: Naval Institute Press
ISBN: 1682470334
Format: PDF, Kindle
Download Now
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant. It is written essentially in four sections. The first (chapters 1 - 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such systems (cyber-espionage), and/or to force these systems to misbehave in ways that disrupt their operations or corrupt their workings. The section examines notable hacks of systems, fundamental challenges to cybersecurity (e.g., the lack of forced entry, the measure-countermeasure relationship) including the role of malware, and various broad approaches to cybersecurity. The second (chapters 6 - 9) describes what government policies can, and, as importantly, cannot be expected to do to improve a nation’s cybersecurity thereby leaving leave countries less susceptible to cyberattack by others. Among its focus areas are approaches to countering nation-scale attacks, the cost to victims of broad-scale cyberespionage, and how to balance intelligence and cybersecurity needs. The third (chapters 10 - 15) looks at cyberwar in the context of military operations. Describing cyberspace as the 5th domain of warfare feeds the notion that lessons learned from other domains (e.g., land, sea) apply to cyberspace. In reality, cyberwar (a campaign of disrupting/corrupting computers/networks) is quite different: it rarely breaks things, can only be useful against a sophisticated adversary, competes against cyber-espionage, and has many first-strike characteristics. The fourth (chapters 16 – 35) examines strategic cyberwar within the context of state-on-state relations. It examines what strategic cyberwar (and threats thereof) can do against whom – and how countries can respond. It then considers the possibility and limitations of a deterrence strategy to modulate such threats, covering credibility, attribution, thresholds, and punishment (as well as whether denial can deter). It continues by examining sub rosa attacks (where neither the effects nor the attacker are obvious to the public); the role of proxy cyberwar; the scope for brandishing cyberattack capabilities (including in a nuclear context); the role of narrative and signals in a conflict in cyberspace; questions of strategic stability; and norms for conduct in cyberspace (particularly in the context of Sino-U.S. relations) and the role played by international law. The last chapter considers the future of cyberwar.

China Illustrated

Author: Arthur Hacker
Publisher: Tuttle Publishing
ISBN: 1462906907
Format: PDF, ePub, Docs
Download Now
This beautifully illustrated social history of China highlights various aspects of traditional China as seen through the eyes of foreign visitors and residents from the time of the first trading contacts with China in the mid-sixteenth century to the beginning of World War II. The lives and lifestyles of the fascinating mix of people who came to China, as well as the places they visited and the sights and customs that attracted their attention, are set against the backdrop of China's great cities and it's ancient culture. A short history of the period sets the scene in each chapter, allowing the reader to follow the dramatic changes that took place through the turbulent years when China moved from feudal empire to republic. The illustrated sections which follow focus on notable themes and topics. The hundreds of unique images in China Illustrated, including early engravings and maps, hand–colored prints, studio portraits and amateur photographs, postcards, drawings and cartons come from the private collection of Arthur Hacker. Collected with the eye of an artist and the knowledge of a historian they eloquently bring China's social history to life.

Putin His Downfall and Russia s Coming Crash

Author: Richard Lourie
Publisher: Macmillan
ISBN: 1250135966
Format: PDF, ePub
Download Now
An electrifying and timely book, by leading Russian expert Richard Lourie, that explores Putin's failures and whether Trump's election gives Putin extraordinarily dangerous opportunities in our mad new world. "A master chronicler of modern Russia. Drawing on his own expertise, Lourie paints a convincing portrait of a ruthless authoritarian leader headed toward failure. This book serves as an essential primer on Putin and, by extension, Russia."—Publishers Weekly For reasons that are made clear in this book, Putin’s Russia will collapse just as Imperial Russia did in 1917 and as Soviet Russia did in 1991. The only questions are when, how violently, and with how much peril for the world. The U.S. election complicates everything, including: · Putin’s next land grab · Exploitations of the Arctic · Cyber-espionage · Putin and China ...and many more crucial topics. Putin: His Downfall and Russia's Coming Crash is an essential read for everybody bewildered and dismayed by the new world order.

The Master Hacker

Author: Steve Burkart
Publisher: Outskirts Press
ISBN: 147878671X
Format: PDF, Mobi
Download Now
When SunHee Nham, a disaffected North Korean computer scientist working in China, decides to escape her conscription, she takes a few secrets with her. Her dream of living in freedom in the U.S. begins to prey on her mind when she thinks about the hardships under which her fellow countrymen are forced to live. After a chance meeting with John Darque, the head of a covert organization charged with maintaining the balance of power in the world, the two form a partnership to destroy a weapon system she developed for use against Western nations. When she becomes aware of pursuing Chinese agents, she knows her freedom will be short lived. To make matters worse, she realizes her association with Darque’s group will put it in danger of being exposed. SunHee’s noticeable depression changes for the better when Darque poses a plan to turn the tables on a group of rogue nations intent on using the technologies she developed to blackmail the rest of the world. She agrees to help Darque with his plan in the hope that the results will create the spark of change needed to better the lives of her countrymen. However, with change comes sacrifice, and sometimes the price of sacrifice can be very high.

Inside Cyber Warfare

Author: Jeffrey Carr
Publisher: "O'Reilly Media, Inc."
ISBN: 1449325459
Format: PDF, Docs
Download Now
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

Cyberspace and National Security

Author: Derek S. Reveron
Publisher: Georgetown University Press
ISBN: 1589019199
Format: PDF
Download Now
In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.