Battlefield cyber: how China and Russia are undermining our democracy and national security
"The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Essex, Conneticut
Prometheus Books
[2023]
|
Schlagworte: | |
Online-Zugang: | Register // Gemischte Register |
Zusammenfassung: | "The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are" |
Beschreibung: | XIV, 285 Seiten 24 cm |
ISBN: | 9781633889019 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049100264 | ||
003 | DE-604 | ||
005 | 20231129 | ||
007 | t | ||
008 | 230814s2023 |||| 00||| eng d | ||
020 | |a 9781633889019 |c hbk |9 978-1-63388-901-9 | ||
035 | |a (OCoLC)1403378843 | ||
035 | |a (DE-599)BVBBV049100264 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
100 | 1 | |a McLaughlin, Michael G. |e Verfasser |0 (DE-588)1305817117 |4 aut | |
245 | 1 | 0 | |a Battlefield cyber |b how China and Russia are undermining our democracy and national security |c Michael G. McLaughlin and William J. Holstein |
264 | 1 | |a Essex, Conneticut |b Prometheus Books |c [2023] | |
300 | |a XIV, 285 Seiten |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a "The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are" | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 7 | |a Russland |0 (DE-588)4076899-5 |2 gnd |9 rswk-swf | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
653 | 0 | |a Cyberterrorism / United States | |
653 | 0 | |a Cyberterrorism / Government policy / United States | |
653 | 0 | |a Information warfare / United States | |
653 | 0 | |a Computer networks / Security measures / United States | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Cyberterrorism | |
653 | 0 | |a Information warfare | |
653 | 2 | |a United States | |
653 | 0 | |a SOCIAL SCIENCE / Sociology / General | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Russland |0 (DE-588)4076899-5 |D g |
689 | 0 | 2 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 3 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Holstein, William J. |d 1951- |e Verfasser |0 (DE-588)1305818318 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-63388-902-6 |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034361808&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Register // Gemischte Register |
940 | 1 | |n oe | |
940 | 1 | |q BSB_NED_20231129 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034361808 | ||
942 | 1 | 1 | |c 609 |e 22/bsb |f 090512 |g 73 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090513 |g 73 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090512 |g 73 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 73 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 471 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090513 |g 73 |
942 | 1 | 1 | |c 330.09 |e 22/bsb |f 090513 |g 73 |
942 | 1 | 1 | |c 330.09 |e 22/bsb |f 090512 |g 73 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090513 |g 51 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090513 |g 471 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 51 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 090513 |g 73 |
Datensatz im Suchindex
_version_ | 1804185444100866048 |
---|---|
adam_text | Index abortion debate, 84,174 accumulation of events theory, 223-24,225 AcidRain, 9 administrative credentials, 31 advanced persistent threats (APTs): about, 12; APT1, 42,49-51; APT10,57-58, 122,132; APT29,106-7; government sponsors and, 12; Lazarus Group as, 20; in Taiwan, 74—76; targets of, 74; Unit 61398 attack, 140 advertisements with disinformation, 96—99 aggregation principle, 222-24 aggression, acts of, 8,10 AIDS researchers, 21-23 aircraft thefts, 135-37 Aitel, Dave, 104 Alexander, Keith, 43 algorithms, 103 Alibaba, 104-5 Alliance for Securing Democracy, 90 Alphabet. See Google Amazon, ix-x, 185-86,192—93 Amnesty International, 62 Apache Software Foundation, 104-6 Apple: compromises in Chinese operations, 163-65; data centers, 59-60; dominance of, 186; manufacturing centers, x; privacy policies, 63 APTs. See advanced persistent threats (APTs) ARPANET, 189 Articles on Responsibility of States for Internationally Wrongful Acts, 223 artificial intelligence: in China, 71-73; managing networks, 202; merging real and fictional worlds, 240; piecemeal policies on, 239; using for political purposes, 240 Tie Art of War (Sun Tzu), xi, 145,175 ASML Holding (Holland), 156 “attack surface” reductions, 201 attribution, 11 audits, 232 267
Index authentication of open-source software, 30,193-94 authentication of social media accounts, 178—79,187 authoritarianism, 175 auto industry comparison, 194-95 Avramov, Kiral, 21 Belt and Road Initiative, 53 Bersin, Alan, 170 Big Data analytics, 72—73 Big Tech companies, 70, 73, 76-78,184-87. See also Amazon; Apple; Google; Meta Platforms; Microsoft biometric information, 64 Bitcoin, 32-34 Black, Paul E., 108-11,194, 196,203 BlackEnergy, 8 “black-hat SEO,” 90-91 BlackMatter ransomware group, 34 Blackwell, Tom, 45 blockchain technology. See Bitcoin Bolton, John, 57 Boyusec (Guangzhou Bo Yu Information Technology Company), 138-41 Brandt, Jessica, 92 Bricken, Harris, 59 Britain’s Online Safety Bill, 179-80 Brookings Institution, 90 BuzzFeed reports, 65 268 ByteDance, 63,64, 65 Calof, Jonathan, 45 Caltagirone, Sergio, 36 Canada. See Nortel Networks canary files, 202 Carlisle, Herbert “Hawk,” 127-28 Carlson, Tucker, 86, 88 Carr, Brendan, 65-66,132 CCP (Chinese Communist Party), 76-77 Cena, John, 150 Center for Digital Democracy, 187 Center for Security and Emerging Technology (CSET), 99,153, 157-58 Central Intelligence Agency (CIA) restrictions, 16 certificate authority, 4 certification standards, 235—37 CFIUS (Committee on Foreign Investment in the United States), 157,210 Chester, Jeffrey, 187 chief information officer (CIO), 47 chief information security officer (CISO), 49,197-98 child pornography, 176-77 China: art of war, xi, 145,175; Belt and Road Initiative, 53; centralized governmental control, 77; controlling online narratives, 88-92; Digital Silk
Index Road, 53-54, 69; educational advantages of populace, 241-42; “Five-Year Plans,” 42-43; Great Firewall, 81, 93, 192-93,248nl6; intimidation efforts, 243; laws of, 59-61, 62; Ministry of State Security, 75, 108,109,138-41; products of, 232—33; Russia cooperating with, 87—88; Taiwan takeover, 36-37; U.S. scattered efforts against, 17-18; at World Internet Conference, 193. See also Chinese cyber warfare; Chinese data thefts; Chinese thefts of defense technology; globalization, retreat from; People’s Liberation Army (PLA) China Radio International (CRI), 92-93 “China’s Digital Ambitions” (de La Bruyère), 68—69 Chinese cyber warfare: acquiring and using digital data, 69—73, 76-78, 99-100; blocking social media platforms, 182—83; cloud computing and, 122-24; disinformation influencing global discourse, 93-95; “global discourse” as propaganda, 87; hacking telecommunication providers, 113; intellectual property thefts, 43—46; new face of, 10-14; penetrating Nortel Networks’ emails, 39-42; on social media, 89-92, 99-100; technology thefts, vi-vii; in traditional media, 92-93. See also Chinese data thefts; Chinese thefts of defense technology; Huawei Technologies Chinese data thefts: artificial intelligence and, 71—73; Equifax hack, 57; first largescale occurrence, 55-56,57; patterns, 60-61; Russian strategy comparison, 54—55; Starwood Hotels and Resorts, 56—57; in Taiwan, 74—76; TikTok and, 63-66; undersea cables used in, 66-68; United Airlines hack, 56; uses of data, 69—73; WeChat, 61-63. See also advanced persistent threats (APTs); Huawei Technologies Chinese thefts of
defense technology: aircraft technology, 135-37; Carlisle on, 127-28; challenge of cybersecurity models, 140-41; crowd sourcing espionage, 138—41; government and private sector joining in, 131; Gulf War technology, 129-30; Holt on, 128-29; leading to maritime superiority, 134—35; missiles, 142-43; Naval Undersea Warfare Center hack, 141—42; 269
Index Pentagon information, 132; possible fùture scenario, 14346; U.S. Navy weaknesses and, 130-35,139-40 Chip 4 Alliance, 158 CHIPS and Science Act, 150, 152,160,162,167,170,243 Chossudovsky, Michael, 89-90 Chung, Dongfan, 136 CIA (Central Intelligence Agency) restrictions, 16 CIO (chief information officer), 47 CI SA. See Cybersecurity and Infrastructure Security Agency (CISA) CI SO (chief information security officer), 49,197-98 classified discussions, 233 Clinton, Larry, 69 Clinton (Hillary) campaign, 82-83 cloud computing: about, 58; Alibaba, 104-5; Big Tech and, ix-x; mall analogy, 118-20; providers of, 117; types of services, 118-20. See also cloud computing vulnerabilities cloud computing vulnerabilities: about, 122-23; Chinese tactics, 122-24; house analogy, 120-21; “Jane” (tech executive) on, 11724; medieval castle analogy, 115-17; Pentagon information 270 and, 132; private sector and, 124-25; Russian tactics, 124 Coast Guard, 213-14,215 Coats, Dan, 135 collective efforts. See public and private sector collaboration Colonial Pipeline Corporation, 32-34,208 Commerce Department, 160-61 Committee on Foreign Investment in the United States (CFIUS), 157,210 Communications Decency Act, 175-79,187 coronavirus. See COVID-19 corporations. See globalization, retreat from; private sector; public and private sector collaboration; strategies for corporations COVID-19: Chinese propaganda on, 89-90, 94-95; as excuse for Chinese control of Western journalists, 91—92; hazards created during, 203; U.S. polarized coverage of, 79 Cozy Bear, 106-7 CPC Corporation, 75 Craigslist, 177
CRI (China Radio International), 92-93 critical infrastructure, 23,234,238, 246n7 Crovitz, Gordon, 96,98-99, 177-78
Index crowd-sourcing espionage, 138-41 cryptocurrencies. See Bitcoin CSET (Center for Security and Emerging Technology), 99, 153,157-58 Cunningham, Chase, 101-2, 105-6,116,123,195,201-2 Cyber Command, 14-16 Cyber Force, xiv, 209,212-17,226 Cyber Incident Reporting for Critical Infrastructure Act, 208,228 Cyber National Guard, 21517,226 Cybersecurity and Infrastructure Security Agency (CISA): on Apache code, 105; creation of, xiii-xiv, 205; on infrastructure, 23; Joint Cyber Defense Collaborative, 233,235-37; making into cabinet-level agency, 226; National Defense Authorization Act, 207; reporting on China’s MSS, 13; required reporting to, 228; role of, 16,208-9, 210 Cybersecurity Information Sharing Act, 229 cybersecurity insurance policy, 122 Cyber Warfare—Truth, Tactics, and Strategies (Cunningham), 101, 116 Cybersecurity Workforce Assessment Act, 219 Cyberspace Policy Review, 229 Cyberspace Solarium Commission, 217,218,228, 234-35. See also public and private sector collaboration cyber warfare: American public as part of problem, x-xi; battlefield of, v-viii; blame for, ix—xi; definitions of, viii—ix; early attacks, 115—17,256nl; identifying hackers, 11; spear phishing, 29-30,51,64, 203; Stuxnet, 3-5; targeting infrastructure and critical supply chains, 37; undermining faith in institutions, viii. See also cloud computing vulnerabilities; malware; ransomware; specific countries; specific cyberattacks DarkSide group, 32-34 dark web, 26-29,31 data: breaches of, 199-200; collection of, 66-69; power of, 54; uses of, 69-73 data lakes, 69-70 Daxin, 13 DDoS (distributed denial-
ofservice) attack, 6 “Defend Forward” plan, 205 Defend Forward strategy, 14-15 Defense Department: certifying cybersecurity vendors, 235-37; Defend Forward strategy, 14-15; examining critical infrastructure, 234; national 271
Index digital citizens, 241-42 digital divide, 226 digital honeypots, 202 digital militia. See ransomware digital redlining, 220-21 Digital Services Academy, 21920,226 Digital Services Act, 181 Digital Services Department, xiv, 209-11,226 Digital Silk Road, 53-54, 69 distributed denial-of-service (DDoS) attack, 6 Div, Lior, 43-44 Dobbs v. Jackson Womens Health Organization, 174 domestic access, 230 domestic cyberspace, 16-17 Douyin, 63 dual use products, 151-52 Dudakov, Malek, 86 Dune (Herbert), 8 Dunn, Frank, 39-42 defense acts and, 217-18; role of, 230. See also Cyber Force Defense Federal Acquisition Regulation Supplement (DFARS), 195 defense industrial base (DIB), 128,133-35,138-41,235 Defense Innovation Unit, 211 defense supply chain vulnerabilities. See Chinese thefts of defense technology de La Bruyère, Emily, 55, 68-69,72 Delaware Court of Chancery, 200-201 Delaware Supreme Court, 200201 democracies: China and Russia undermining faith in, 99-100; Chinese narratives on, 87-88; cyber warfare aiming to subvert, viii-ix; internet and cybersecurity in, 190-91, 193-97; naivete of Americans, xi—xii departments of the federal government. See specific departments DeSombre, Winnona, 11 DFARS (Defense Federal Acquisition Regulation Supplement), 195 DIB (defense industrial base), 128,133-35,138-41,235 Dickinson, Steve, 59, 72 Easterly, Jen, 23,105 EDA (electronic design automation), 154,160 education, 203,218-22,226, 241-42 electronic design automation (EDA), 154,160 Electronic Frontier Foundation, 28,176 encryption, 22-23. See also ransomware 272
Index Equifax hack, 57 Europe Union’s laws, xiii, 181, 186-87 Evanina, William R., 96 Exchange service attack, 107-8 Executive Order on Improving the Nations Cybersecurity, 117,205 Facebook, vi, 89,172,240 facial images, 64 facial-recognition software, 66 fake videos, 99 false names on social media, 173-75 Fanell, Jim, 135 FAR (Federal Acquisition Regulation), 195 FARA (Foreign Agent Registration Act), 97,180Sl, 182 FBI (Federal Bureau of Investigation), 13,16,136-37, 143,208 FCC (Federal Communications Commission), 65-66 Federal Acquisition Regulation (FAR), 195 Federal Bureau of Investigation (FBI), 13,16,136-37,143,208, 264n35 Federal Communications Commission (FCC), 65-66 federal government: agencies relying on private sector, 229-30; cybersecurity challenges, 205-6; government agencies, xiii-xiv; reporting data breaches to, 199-200; responding naively to China, x; retreating from globalization, 153—54; Russians influencing presidential elections, 82-83; shaping corporate behavior, 237. See also federal government recommendations; public and private sector collaboration; specific governmental agencies and departments federal government recommendations: about, 207; Congressional actions, 217-22; Cyber Force, xiv, 209,212-17, 226,263nl3; Cyber National Guard, 215-17, 226; Digital Services Department, 209-11, 226; international cyber laws, 222-26; national cyber director, 218; recent cybersecurity efforts, 205; reforms in agencies, 207-9; summary, 226. See also specific legislation The Federalist Papers, 173 federal response options, 230 Federal Security Service (FSB), 36,
83-84 Federal Trade Commission (FTC), 18,182,186 fiber-optic networks, 14, 66-68 273
Index Fifty-Fourth Research Institute in China, 57 Fighting Inflation legislation, 243-44 Fight Online Sex Trafficking Act (FOSTA), 177 FireEye cybersecurity firm, 139-40 firewalls, 51 Firstbrook, Peter, 107 FISA (Foreign Intelligence Surveillance Act), 16, 77 5G wireless communications, 68-69,170,239-40. See also Huawei Technologies “Five-Year Plans,” 42-43 Foreign Agent Registration Act (FARA), 97,180-81,182 Foreign Intelligence Surveillance Act (FISA), 16, 77 Foreign Security Service (SVR), 106 forums on dark web, 28-29 FOSTA (Fight Online Sex Trafficking Act), 177 FoxConn, 164,165 Friedman, Milton, xii FSB (Federal Security Service), 36, 83-84 FTC (Federal Trade Commission), 18,182,186 Fujian, 134-35,136,144 Gerasimov doctrine, 7-8 Gerstell, Glenn S., 17-18,207, 219,230 Gibson, Liam, 159 GitHub, 103,106 Gladkikh, Evgeny Viktorovich, 35-36 globalization, retreat from: Chinese retaliation, 165-69; CHIPS and Science Act, 160, 162,167,170; government and private sector involvement needed in, 153-54; investors needing to support, 159-61; new chip plants in U.S., 161— 62; rare earths gap, 169-70; rebalancing market dependence on China, xiii; reshoring production, 152—53; strategic implications of business in China, 149—52; summary of recommendations, 170; total cost of ownership formula and, 167,168; U.S. controlling exports to China, 158-61. See also Apple; semiconductor industry Global Tone Communications Technology (GTCOM), 60 Goldberg, Michelle, viii Google, 63, 98-99,193 Gorbachev, Mikhail, 88 Gorman, Siobhan, 49 government. See federal government; federal government
recommendations; 274
Index public and private sector collaboration; specific governmental agencies and departments Graham, Katharine, 190-91 Grindr app, 174-75 GRU (Russian intelligence service), 8-9, 82-84 GTCOM (Global Tone Communications Technology), 60 Guangzhou Bo Yu Information Technology Company (Boyusec), 138-41 Gulf War technology, 129-30 Hong Kong National Security Law, 62 Hon Hai Industries, 164 hop points, 27-28 Huawei Technologies: artificial intelligence and, 72; background, 43-46; building “smart city,” 66; Digital Silk Road strategy, 54; Taiwan not using, 232-33; U.S. military vulnerability and, 133 Human Hacking (Hadnagy), 80 Humby, Clive, 53 Hunt Forward Operations, 15-16 hybrid cloud, 119,122 hack-a-thon competitions, 12 Hadnagy, Christopher, 30, 80, 83,242 Harris Bricken, 165-66 hashes, 47-48 Hatch, Orrin, 185 Haugen, Frances, 181 Henderson, Scott, 11, 70,130 Herbert, Frank, 8 Hikvision, 232 Hoffman, Samantha, 60, 73, 76-77 Hollywood mafioso analogy, 24-26 Holstein, Bill, 74 Holt, Cameron, 128-29 Homeland Security, Department of, 18,105,209,213-14,215 honeypots, 202 IANA (Internet Assigned Numbers Authority), 189 IBM, 57-58 ICANN (Internet Corporation for Assigned Names and Numbers), 190 incentive structure for corporations, 237 India’s bans on TikTok, 65 Indo-Pacific Economic Framework, 159 Industroyer, 8 In-Q-Tel, 211 In re Caremark International, 200-201 In re Clovis Oncology, 200-201 Instagram, 80, 176—77 Intel, 159-60,161 275
Index intellectual property, China’s thefts of, 43-46. See also Chinese thefts of defense technology International Court of Justice, 224-25 international law, 7,10,222-26 internet: beginnings, 171,189-90; expansion, xii; as house of cards, 105-6; influence of, 171-72; next-generation version, 239. See also cloud computing; cloud computing vulnerabilities; social media; social media accountability measures Internet Assigned Numbers Authority (IANA), 189 Internet Corporation for Assigned Names and Numbers (ICANN), 190 Internet of Things, ix, 66 Internet Research Agency (IRA), 82-83, 84-86 Interstate Commerce Commission, 184 The Interview (film attack), 6-7 Ionov, Aleksandr Viktorovich, 85 iPhone hacks, 164—65 IRA (Internet Research Agency), 82-83, 84-86 Iran: distributed denial-of-service attack, 6; Lincoln College attack, 34; ransomware threat from, 20; Stuxnet attack on, 3—5; testing legal boundaries, 225-26 Iraq, 71,129-30 Israel, 3-5,223 Japan, 158 JBS Foods, 34 Joint Cyber Defense Collaborative (JCDC), 233,235-37 Jyan, Howard, 74,99,231 Khan, Lina, 186 KillDisk, 8 Kittner, Cristiana, 12 Klein, Ezra, 100 Korea, 158 Kosseff, Jeff, 176 Krause, Felix, 65 Krebs, Chris, x, 209 Lawfare article, 235 Lazarus Group, 20 Le, Vinhcent, 221 Lee, Doowan, 77,191,237, 240,241 “letters of marque and reprisal” analogy, 9-10 Li, Joanne, 62 Lincoln College, 34 LinkedIn, 96,196 Linux kernel, 103-6 Linvill, Darren, 90 Liska, Allen, 36 Livelink logs, 41 Lockerman, Frank, 64 Log4j code, 104-6 Louis, Gilman, 235 276
Index low-orbit satellites, 191,203 Mallory, Kevin Patrick, 96 malware, 5-6, 8, 9,108. See also ransomware; spear phishing; supply-chain attacks managed service providers (MSPs), 57-58 Mandiant, 11,12-13,49-51, 95, 137-38,140 Mapping China’s Tech Giants project, 70 Marchand v. Barnhill, 200-201 marketplace of validated cybersecurity vendors, 235-36 marketplaces on dark web, 29 Marriott International, 56-57 Mattis, James, 14 McFadden, Brian, 41 McGregor, James, 150-52 McKinsey Company estimates, 240 McLaughlin, Michael, 56,235 medieval castle analogy, 115—17 memory forensics, 48 Messing with the Enemy (Watts), 83-84 Meta Platforms, 240. See also Facebook; Instagram Meyers, Adam, 106-7 Micron Technology, 161 micro-segmentation of networks, 201-2 Microsoft: Activision Blizzard, 240; Azure’s public cloud, 120; Chinese operations, ix-x; data centers in China, 59-60; domain servers, 47-48; Exchange service attack, 107-8, 264n35; human-operated ransomware, 30—31; Minecraft, 104-5; Netscape crippled by, 185; Outlook code, 103; PowerShell, 196-97; working with NewsGuard, 98 Microsoft Threat Intelligence Center (MSTIC), 20 military transports, 136 Minecraft, 104-5 Ministry of State Security (MSS), 75,108,109,138-41 MIT Technology Review article, 105 MLPS 2.0 (Multi-Level Protection System), 59 Monaco, Lisa, 207-8,210 monopolists, 184-85 Montgomery, Mark, 205-6,218, 219,228,233 Moore, Richard, xi Moser, Harry, 166—69 MSPs (managed service providers), 57—58 MSS (Ministry of State Security), 75,108,109,138-41 MSTIC (Microsoft Threat Intelligence Center), 20 Multi-Level Protection System
(MLPS 2.0), 59 277
Index Nadelstichtaktik (needle prick), 223-24 Nakamoto, Satoshi, 33 Nakasone, Paul, 14,17,207 Natana nuclear facility, 3-5 National Academies of Sciences, Engineering, and Medicine report, 81-81 national cyber director, 218 National Defense Authorization Act, 207 National Defense Industrial Association, 128 National Digital Reserve Corps, 211 National Guard, 214—15 National Institute of Standards and Technologies (NIST), 13, 108-9,210 National Interest article, 59 National Security Agency (NSA), 5,16-17 national security presidential memorandum (NSPM), 15 Netscape, 185 networks: federal government creating, 237; interconnectivity of, ix; of private sector, 17-18; security and perimeters of, 11517,201-2,204,263nl3; tactics for gaining access to, 30—31. See also cloud computing; cloud computing vulnerabilities; internet NEW Cooperative cyberattack, 34 278 Newport Wafer Fab, 156 NewsGuard, 96-98 New York Times article, 163 Nexperia, 156-57 Nicaragua, 224—25,265n51 NIST (National Institute of Standards and Technologies), 13,108-9,210 normative aggregation, 222-23 Nortel Networks, 39-42, 44-49,51 North Korea, 6-7,20,225-26 NotPetya, 5—6, 7 NSA (National Security Agency), 5,16-17 NSPM (national security presidential memorandum), 15 numbing strategy, vii Office of Foreign Asset Control (OFAC),20 Office of Management and Budget (OMB), 195 Office of Personnel Management (OPM) data attack, 55-56 OMB (Office of Management and Budget), 195 Onion Router (TOR), 27-28 open-source software authenticity, 193-94 operational capability, 230 Operational Technology (ОТ), 249-50n45
Index private sector collaboration; strategies for corporations; specific corporations public and private sector collaboration: fusion center for sharing information, 234-35,237-38; importance of, 228-30; marketplace of validated cybersecurity vendors, 235-37,238; summary of recommendations, 237-38; in Taiwan, 231-33; War Production Board in World War II, 227-28; weather event comparison, 233-34 public cloud, 118 Pushkov, Vasily V, 87 Putin, Vladimir, v, 243 ОРМ (Office of Personnel Management) data attack, 55-56 Orion software, 6 Ovide, Shira, 230 Palantir (software company), 71 Palestine Liberation Organization (PLO), 223 Penetrium, 66 People’s Liberation Army (PLA), 44, 70, 75,130,137-38,158 The Perfect Weapon (Sanger), 8 PLO (Palestine Liberation Organization), 223 politics in United States, 84—86, 243-44 Popp, Joseph L., 21-23 Postel, Jon, 189-90 PowerShell, 107,196-97 “Preserving the Chokeholds” report (CSET), 157-58 private cloud, 118-19 private sector: cloud threats in, 124-25; government shaping behavior of, 237; investors and globalization, 159-61; management ignoring hacks and threats, 48-49, 52, 61; networks, 17—18; profit motive, xii, 73, 76-78,124-25,230; ransomware strategy, 21; retreating from globalization, 153-54; role in cybersecurity, 76,102. See also public and Qiao Liang, 130 “the Quad,” 159 RaaS (ransomware-as-a-service), 24-26,28,31-32 Radchenko, Sergey, 88 radio communication, 92-93 ransomware: about, ix, x, 19-21; administrative credentials as goal of, 31; Colonial Pipeline attack, 32-34,228; DarkSide, 32-34; inception of, 21-23; as multibillion-
dollar industry, 23-26; originating in Russia, 9; RaaS notifying victim, 31-32; REvil group, 34, 36; as risk to 279
Index all sectors, 23; spear phishing, 29-30,51,64,203; tactics for gaining access to networks, 30-31 ransomware-as-a-service (RaaS), 24-26,28,31 rare earths, 169-70 Reagan, Ronald, xii The Record reports, 202 reports on cyber incidents, 202, 208-9 repository poisoning, 103 reshoring efforts, 165-69,170 REvil ransomware group, 34, 36 Rid, Thomas, 86 Roe v. Wade, 174 RT as news source, 97, 98 Russia: centralized government controlling, 77; Chinese cooperation with, 87-88; Conti group, 20, 36; intentions of, xi, 21; as new face of cyber warfare, 7-10; stopping short of aggression, 8,10; testing legal boundaries, 225-26. See also Russian cyber warfare; Russian government agencies; Ukraine, cyber attacks on; Ukraine, invasion of Russian cyber warfare: cloud computing and, 124; data theft strategy, 54, 67—68; disinformation, 81—87, 97, 99; “letters of marque and reprisal” analogy, 9—10; malware, 5—6, 8, 9; REvil, 34; “Sandworm,” 8,263nl4; Saudi Arabian oil refinery, 35; SiegedSec, 84; SolarWinds, 6, 7,16—17,106-7, 229-30,235 Russian government agencies: Federal Security Service, 36, 83-84, 85,248nl6; Internet Research Agency, 82-83; military intelligence service (GRU), 8-9, 82-84,263nl4; SVR, 6, 84,106 Russofile.com, 97-98 Ryan, Paul, 165 SaaS (software-as-a-service) applications, 58,118 “safe city,” 66 SafeGuard Cyber, 81, 90 SAFE TECH (Safeguarding against Fraud, Exploitation, Threats, Extremism and Consumer Harms) Act, 180,188 Samsung Electronics, 161 Sanger, David, 8 Sarsour, Linda, 85-86 Saudi Arabian oil refinery, 35 Schlein Ted, 202 Schmidt, Eric, 242 script kiddies, 25
Sea Dragon program, 142,144-45 search engine optimization (SEO), 90-91 280
Index SEC (Securities and Exchange Commission), 18,161,200,204 Section 230,175-79,187 Securities and Exchange Commission (SEC), 18,161, 200,204 security clearance information, 70-71 semiconductor industry: about, 154-55; China’s interest in, 152,153; goals of U.S. in, 158-63; manufacture of chips, 158-60; manufacture of equipment, 155,156-58; reinvigoration of, 168-69 Semiconductor Manufacturing International Corporation (SMIC), 154 SEO (search engine optimization), 90-91 SESTA (Stop Enabling Sex Traffickers Act), 177 Sherman Antitrust Act, 184—85 Shields, Brian, 40-42,46—49, 51, 59, 60 ShutDownDC group, 174 signatures, 202 Silex Microsystems, 156 “Silicon Twist” report (CSET), 158 Silk Road, 29 single-factor authentication, 30 “smart city,” 66 281 SMIC (Semiconductor Manufacturing International Corporation), 154 Snowden, Edward, 43 Soble, Stephen, 111-14,197-99 social credit scores, 61 social engineering, 29-30 Social Engineering (Hadnagy), 30 social media: AI and, 99; algorithms, 80; Americans addicted to, 80-81; China’s use of, 94-95; fake accounts and reports on, 171-73; false narratives in, vi; as part of solution, xii-xiii; right to anonymity, 173-75; role of advertising, 96-99. See also Facebook; Instagram; LinkedIn; social media accountability measures; TikTok; Twitter; WeChat social media accountability measures: antitrust policies, 184-87,188; banning Chinese platforms, 182—84,188; cooperating with Europe and Japan, 187,188; enforcing FARA, 180-81; exploring WeChat prohibitions, 183-84, 188; influencers’ disclosure of advertisers, 181—82; labeling advertisements
from foreign governments, 180-82,188; legislation pending, 180,188; middleware tools for, 179-80,
Index 187; reforming Section 230, 175-79,187; summary of recommendations, 187-88 software: licensing of developers, 195-96,204; patches for, 10910,112,203; responsibilities of companies providing, 204; SaaS applications, 58; workforce shortages in industry, 206,218-22. See also software vulnerabilities; specific software applications software vulnerabilities: background, 101-3; Black on, 108-11; levels of, 113; Linux kernel, 103-6; NotPetya, 5-6, 7; “persistent access,” vii—viii; pervasiveness of, 113-14; Soble on, 111-14; supply chain attacks, 3-5, 6,106—8,121-23 software-as-a-service (SaaS), 58, 118 SolarWinds software, 6, 7,16—17, 106-7,229-30,235 spear phishing, 29-30,51, 64,203 Special form 86 (security clearance), 56 splinternet, 190-91 Sputnik television, 87, 98 Sri Lanka, 53 STEM education, 221 Stop Enabling Sex Traffickers Act (SESTA), 177 strategies for corporations: accepting network perimeters 282 are everywhere, 201-2; auto industry comparison, 194-95; building low-orbit satellites, 191,192-93; cybersecurity, 193-97; improved decision making in corporate world, 197-201; layers of protection, 201-3; multiplicity of steps in, 191-92; problem with creating splinternet, 190-91 Stuxnet, 3—5 Su Bin, 136-37 submarine-launched antiship missiles, 142-43 Sun Tzu, xi, 145,175 supercarriers, 134—35 supply-chain attacks, 3-5, 6, 106-8,121-23 SVR (Foreign Security Service), 6. 84,106 Symantec, 13 Taiwan, 74—76,150,158-59,161, 231-33 Tamari, Shir, 120 TCO (total cost of ownership) formula, 167,168 technology education, 241 telecommunication hacks, 113 television and
disinformation, 93 Tencent Holdings, 61,183-84 Third Way think tank, 217 threat intelligence, 230 Tiananmen Square, 88
Index TikTok: about, 61, 63-66; artificial intelligence and, 72; banning, 188; Chinese government having access to, 132,183; disinformation on, 100 Tong, Wen, 45 TOR (Onion Router), 27-28 Torvalds, Linus, 103-4 total cost of ownership (TCO) formula, 167,168 training needs, 203,218-22,226, 241-42 Transportation Security Agency (TSA), 18 Trump campaign, 82-83 TSA (Transportation Security Agency), 18 TSMC (Taiwan Semiconductor Manufacturing Company), 161 Turpin, Matt, 161 TW Cert, 232 The Twenty-Six Words That Created the Internet (Kossef), 176 Twitter, 89,172,179 Uber analogy, 24-25 Uhuru Movement, 85 Uighur repression, 89, 91,164-65, 169-70 Ukraine, cyber attacks on, 5-6, 8-9 Ukraine, invasion of: Chinese narrative on, 87-88; consequences of sanctions, 34-36; Conti group and, 20; politics and, 243; Russian people unaware of war crimes, 81; Uhuru group and, 85 Ulbricht, Ross “Dread Pirate Roberts,” 29 uncategorized groups (UNC), 51 Unit 61398,17,42,50-51,55, 137-38,139-40 United Nations, 223—25 universities, xiv Unrestricted Warfare (Qiao and Wang), 130 U.S. government. See federal government; federal government recommendations; specific governmental agencies and departments U.S. Navy, 58,130-35,139-40, 141-42 U.S. race relations, 94—95 U.S.-Taiwan Initiative on 21st-Century Trade, 159 VAST-OSINT, 191 venture-capital firms, 159, 202,211 Viasat, 192 Vippi Media, 91—92 VirusTotal. com, 15 wafer fabrication, 156 Walker, Kent, 193 Wall Street Journal reports, 159-60 Wang Xiangsui, 130 283
Index WannaCry ransomware, 20 War Production Board, 227-28 Watts, Clint, 83-84 weather event analogy, 233-34 WeChat, 61-63,175,183-84,188 “white hat” hackers, 63, 64 Wikileaks, 82 “Wilson Edwards,” 90 Wingtech Technology, 156—57 Winter Olympics, v, 91-92 wiretaps, 77 Wiz (cloud security firm), 120 Women’s March, 85—86 workforce shortages, 206,218-22 World Internet Conference, 193 284 Wray, Christopher, 127,143 Xiaomi, product, 76 Xi Jinping, v, xii, 10-11,131,151 Xinjiang Province, 169-70 Yantar, 67—68 Yazici, Volkan, 105 Yeshitela, Omali, 85 Young, Tyler, 206 zero-day exploits, 4-5 Zhao Lijian, 89, 94-95 Zoom, 61, 72,188 Zuckerberg, Mark, 185,239-40
|
adam_txt |
Index abortion debate, 84,174 accumulation of events theory, 223-24,225 AcidRain, 9 administrative credentials, 31 advanced persistent threats (APTs): about, 12; APT1, 42,49-51; APT10,57-58, 122,132; APT29,106-7; government sponsors and, 12; Lazarus Group as, 20; in Taiwan, 74—76; targets of, 74; Unit 61398 attack, 140 advertisements with disinformation, 96—99 aggregation principle, 222-24 aggression, acts of, 8,10 AIDS researchers, 21-23 aircraft thefts, 135-37 Aitel, Dave, 104 Alexander, Keith, 43 algorithms, 103 Alibaba, 104-5 Alliance for Securing Democracy, 90 Alphabet. See Google Amazon, ix-x, 185-86,192—93 Amnesty International, 62 Apache Software Foundation, 104-6 Apple: compromises in Chinese operations, 163-65; data centers, 59-60; dominance of, 186; manufacturing centers, x; privacy policies, 63 APTs. See advanced persistent threats (APTs) ARPANET, 189 Articles on Responsibility of States for Internationally Wrongful Acts, 223 artificial intelligence: in China, 71-73; managing networks, 202; merging real and fictional worlds, 240; piecemeal policies on, 239; using for political purposes, 240 Tie Art of War (Sun Tzu), xi, 145,175 ASML Holding (Holland), 156 “attack surface” reductions, 201 attribution, 11 audits, 232 267
Index authentication of open-source software, 30,193-94 authentication of social media accounts, 178—79,187 authoritarianism, 175 auto industry comparison, 194-95 Avramov, Kiral, 21 Belt and Road Initiative, 53 Bersin, Alan, 170 Big Data analytics, 72—73 Big Tech companies, 70, 73, 76-78,184-87. See also Amazon; Apple; Google; Meta Platforms; Microsoft biometric information, 64 Bitcoin, 32-34 Black, Paul E., 108-11,194, 196,203 BlackEnergy, 8 “black-hat SEO,” 90-91 BlackMatter ransomware group, 34 Blackwell, Tom, 45 blockchain technology. See Bitcoin Bolton, John, 57 Boyusec (Guangzhou Bo Yu Information Technology Company), 138-41 Brandt, Jessica, 92 Bricken, Harris, 59 Britain’s Online Safety Bill, 179-80 Brookings Institution, 90 BuzzFeed reports, 65 268 ByteDance, 63,64, 65 Calof, Jonathan, 45 Caltagirone, Sergio, 36 Canada. See Nortel Networks canary files, 202 Carlisle, Herbert “Hawk,” 127-28 Carlson, Tucker, 86, 88 Carr, Brendan, 65-66,132 CCP (Chinese Communist Party), 76-77 Cena, John, 150 Center for Digital Democracy, 187 Center for Security and Emerging Technology (CSET), 99,153, 157-58 Central Intelligence Agency (CIA) restrictions, 16 certificate authority, 4 certification standards, 235—37 CFIUS (Committee on Foreign Investment in the United States), 157,210 Chester, Jeffrey, 187 chief information officer (CIO), 47 chief information security officer (CISO), 49,197-98 child pornography, 176-77 China: art of war, xi, 145,175; Belt and Road Initiative, 53; centralized governmental control, 77; controlling online narratives, 88-92; Digital Silk
Index Road, 53-54, 69; educational advantages of populace, 241-42; “Five-Year Plans,” 42-43; Great Firewall, 81, 93, 192-93,248nl6; intimidation efforts, 243; laws of, 59-61, 62; Ministry of State Security, 75, 108,109,138-41; products of, 232—33; Russia cooperating with, 87—88; Taiwan takeover, 36-37; U.S. scattered efforts against, 17-18; at World Internet Conference, 193. See also Chinese cyber warfare; Chinese data thefts; Chinese thefts of defense technology; globalization, retreat from; People’s Liberation Army (PLA) China Radio International (CRI), 92-93 “China’s Digital Ambitions” (de La Bruyère), 68—69 Chinese cyber warfare: acquiring and using digital data, 69—73, 76-78, 99-100; blocking social media platforms, 182—83; cloud computing and, 122-24; disinformation influencing global discourse, 93-95; “global discourse” as propaganda, 87; hacking telecommunication providers, 113; intellectual property thefts, 43—46; new face of, 10-14; penetrating Nortel Networks’ emails, 39-42; on social media, 89-92, 99-100; technology thefts, vi-vii; in traditional media, 92-93. See also Chinese data thefts; Chinese thefts of defense technology; Huawei Technologies Chinese data thefts: artificial intelligence and, 71—73; Equifax hack, 57; first largescale occurrence, 55-56,57; patterns, 60-61; Russian strategy comparison, 54—55; Starwood Hotels and Resorts, 56—57; in Taiwan, 74—76; TikTok and, 63-66; undersea cables used in, 66-68; United Airlines hack, 56; uses of data, 69—73; WeChat, 61-63. See also advanced persistent threats (APTs); Huawei Technologies Chinese thefts of
defense technology: aircraft technology, 135-37; Carlisle on, 127-28; challenge of cybersecurity models, 140-41; crowd sourcing espionage, 138—41; government and private sector joining in, 131; Gulf War technology, 129-30; Holt on, 128-29; leading to maritime superiority, 134—35; missiles, 142-43; Naval Undersea Warfare Center hack, 141—42; 269
Index Pentagon information, 132; possible fùture scenario, 14346; U.S. Navy weaknesses and, 130-35,139-40 Chip 4 Alliance, 158 CHIPS and Science Act, 150, 152,160,162,167,170,243 Chossudovsky, Michael, 89-90 Chung, Dongfan, 136 CIA (Central Intelligence Agency) restrictions, 16 CIO (chief information officer), 47 CI SA. See Cybersecurity and Infrastructure Security Agency (CISA) CI SO (chief information security officer), 49,197-98 classified discussions, 233 Clinton, Larry, 69 Clinton (Hillary) campaign, 82-83 cloud computing: about, 58; Alibaba, 104-5; Big Tech and, ix-x; mall analogy, 118-20; providers of, 117; types of services, 118-20. See also cloud computing vulnerabilities cloud computing vulnerabilities: about, 122-23; Chinese tactics, 122-24; house analogy, 120-21; “Jane” (tech executive) on, 11724; medieval castle analogy, 115-17; Pentagon information 270 and, 132; private sector and, 124-25; Russian tactics, 124 Coast Guard, 213-14,215 Coats, Dan, 135 collective efforts. See public and private sector collaboration Colonial Pipeline Corporation, 32-34,208 Commerce Department, 160-61 Committee on Foreign Investment in the United States (CFIUS), 157,210 Communications Decency Act, 175-79,187 coronavirus. See COVID-19 corporations. See globalization, retreat from; private sector; public and private sector collaboration; strategies for corporations COVID-19: Chinese propaganda on, 89-90, 94-95; as excuse for Chinese control of Western journalists, 91—92; hazards created during, 203; U.S. polarized coverage of, 79 Cozy Bear, 106-7 CPC Corporation, 75 Craigslist, 177
CRI (China Radio International), 92-93 critical infrastructure, 23,234,238, 246n7 Crovitz, Gordon, 96,98-99, 177-78
Index crowd-sourcing espionage, 138-41 cryptocurrencies. See Bitcoin CSET (Center for Security and Emerging Technology), 99, 153,157-58 Cunningham, Chase, 101-2, 105-6,116,123,195,201-2 Cyber Command, 14-16 Cyber Force, xiv, 209,212-17,226 Cyber Incident Reporting for Critical Infrastructure Act, 208,228 Cyber National Guard, 21517,226 Cybersecurity and Infrastructure Security Agency (CISA): on Apache code, 105; creation of, xiii-xiv, 205; on infrastructure, 23; Joint Cyber Defense Collaborative, 233,235-37; making into cabinet-level agency, 226; National Defense Authorization Act, 207; reporting on China’s MSS, 13; required reporting to, 228; role of, 16,208-9, 210 Cybersecurity Information Sharing Act, 229 cybersecurity insurance policy, 122 Cyber Warfare—Truth, Tactics, and Strategies (Cunningham), 101, 116 Cybersecurity Workforce Assessment Act, 219 Cyberspace Policy Review, 229 Cyberspace Solarium Commission, 217,218,228, 234-35. See also public and private sector collaboration cyber warfare: American public as part of problem, x-xi; battlefield of, v-viii; blame for, ix—xi; definitions of, viii—ix; early attacks, 115—17,256nl; identifying hackers, 11; spear phishing, 29-30,51,64, 203; Stuxnet, 3-5; targeting infrastructure and critical supply chains, 37; undermining faith in institutions, viii. See also cloud computing vulnerabilities; malware; ransomware; specific countries; specific cyberattacks DarkSide group, 32-34 dark web, 26-29,31 data: breaches of, 199-200; collection of, 66-69; power of, 54; uses of, 69-73 data lakes, 69-70 Daxin, 13 DDoS (distributed denial-
ofservice) attack, 6 “Defend Forward” plan, 205 Defend Forward strategy, 14-15 Defense Department: certifying cybersecurity vendors, 235-37; Defend Forward strategy, 14-15; examining critical infrastructure, 234; national 271
Index digital citizens, 241-42 digital divide, 226 digital honeypots, 202 digital militia. See ransomware digital redlining, 220-21 Digital Services Academy, 21920,226 Digital Services Act, 181 Digital Services Department, xiv, 209-11,226 Digital Silk Road, 53-54, 69 distributed denial-of-service (DDoS) attack, 6 Div, Lior, 43-44 Dobbs v. Jackson Womens Health Organization, 174 domestic access, 230 domestic cyberspace, 16-17 Douyin, 63 dual use products, 151-52 Dudakov, Malek, 86 Dune (Herbert), 8 Dunn, Frank, 39-42 defense acts and, 217-18; role of, 230. See also Cyber Force Defense Federal Acquisition Regulation Supplement (DFARS), 195 defense industrial base (DIB), 128,133-35,138-41,235 Defense Innovation Unit, 211 defense supply chain vulnerabilities. See Chinese thefts of defense technology de La Bruyère, Emily, 55, 68-69,72 Delaware Court of Chancery, 200-201 Delaware Supreme Court, 200201 democracies: China and Russia undermining faith in, 99-100; Chinese narratives on, 87-88; cyber warfare aiming to subvert, viii-ix; internet and cybersecurity in, 190-91, 193-97; naivete of Americans, xi—xii departments of the federal government. See specific departments DeSombre, Winnona, 11 DFARS (Defense Federal Acquisition Regulation Supplement), 195 DIB (defense industrial base), 128,133-35,138-41,235 Dickinson, Steve, 59, 72 Easterly, Jen, 23,105 EDA (electronic design automation), 154,160 education, 203,218-22,226, 241-42 electronic design automation (EDA), 154,160 Electronic Frontier Foundation, 28,176 encryption, 22-23. See also ransomware 272
Index Equifax hack, 57 Europe Union’s laws, xiii, 181, 186-87 Evanina, William R., 96 Exchange service attack, 107-8 Executive Order on Improving the Nations Cybersecurity, 117,205 Facebook, vi, 89,172,240 facial images, 64 facial-recognition software, 66 fake videos, 99 false names on social media, 173-75 Fanell, Jim, 135 FAR (Federal Acquisition Regulation), 195 FARA (Foreign Agent Registration Act), 97,180Sl, 182 FBI (Federal Bureau of Investigation), 13,16,136-37, 143,208 FCC (Federal Communications Commission), 65-66 Federal Acquisition Regulation (FAR), 195 Federal Bureau of Investigation (FBI), 13,16,136-37,143,208, 264n35 Federal Communications Commission (FCC), 65-66 federal government: agencies relying on private sector, 229-30; cybersecurity challenges, 205-6; government agencies, xiii-xiv; reporting data breaches to, 199-200; responding naively to China, x; retreating from globalization, 153—54; Russians influencing presidential elections, 82-83; shaping corporate behavior, 237. See also federal government recommendations; public and private sector collaboration; specific governmental agencies and departments federal government recommendations: about, 207; Congressional actions, 217-22; Cyber Force, xiv, 209,212-17, 226,263nl3; Cyber National Guard, 215-17, 226; Digital Services Department, 209-11, 226; international cyber laws, 222-26; national cyber director, 218; recent cybersecurity efforts, 205; reforms in agencies, 207-9; summary, 226. See also specific legislation The Federalist Papers, 173 federal response options, 230 Federal Security Service (FSB), 36,
83-84 Federal Trade Commission (FTC), 18,182,186 fiber-optic networks, 14, 66-68 273
Index Fifty-Fourth Research Institute in China, 57 Fighting Inflation legislation, 243-44 Fight Online Sex Trafficking Act (FOSTA), 177 FireEye cybersecurity firm, 139-40 firewalls, 51 Firstbrook, Peter, 107 FISA (Foreign Intelligence Surveillance Act), 16, 77 5G wireless communications, 68-69,170,239-40. See also Huawei Technologies “Five-Year Plans,” 42-43 Foreign Agent Registration Act (FARA), 97,180-81,182 Foreign Intelligence Surveillance Act (FISA), 16, 77 Foreign Security Service (SVR), 106 forums on dark web, 28-29 FOSTA (Fight Online Sex Trafficking Act), 177 FoxConn, 164,165 Friedman, Milton, xii FSB (Federal Security Service), 36, 83-84 FTC (Federal Trade Commission), 18,182,186 Fujian, 134-35,136,144 Gerasimov doctrine, 7-8 Gerstell, Glenn S., 17-18,207, 219,230 Gibson, Liam, 159 GitHub, 103,106 Gladkikh, Evgeny Viktorovich, 35-36 globalization, retreat from: Chinese retaliation, 165-69; CHIPS and Science Act, 160, 162,167,170; government and private sector involvement needed in, 153-54; investors needing to support, 159-61; new chip plants in U.S., 161— 62; rare earths gap, 169-70; rebalancing market dependence on China, xiii; reshoring production, 152—53; strategic implications of business in China, 149—52; summary of recommendations, 170; total cost of ownership formula and, 167,168; U.S. controlling exports to China, 158-61. See also Apple; semiconductor industry Global Tone Communications Technology (GTCOM), 60 Goldberg, Michelle, viii Google, 63, 98-99,193 Gorbachev, Mikhail, 88 Gorman, Siobhan, 49 government. See federal government; federal government
recommendations; 274
Index public and private sector collaboration; specific governmental agencies and departments Graham, Katharine, 190-91 Grindr app, 174-75 GRU (Russian intelligence service), 8-9, 82-84 GTCOM (Global Tone Communications Technology), 60 Guangzhou Bo Yu Information Technology Company (Boyusec), 138-41 Gulf War technology, 129-30 Hong Kong National Security Law, 62 Hon Hai Industries, 164 hop points, 27-28 Huawei Technologies: artificial intelligence and, 72; background, 43-46; building “smart city,” 66; Digital Silk Road strategy, 54; Taiwan not using, 232-33; U.S. military vulnerability and, 133 Human Hacking (Hadnagy), 80 Humby, Clive, 53 Hunt Forward Operations, 15-16 hybrid cloud, 119,122 hack-a-thon competitions, 12 Hadnagy, Christopher, 30, 80, 83,242 Harris Bricken, 165-66 hashes, 47-48 Hatch, Orrin, 185 Haugen, Frances, 181 Henderson, Scott, 11, 70,130 Herbert, Frank, 8 Hikvision, 232 Hoffman, Samantha, 60, 73, 76-77 Hollywood mafioso analogy, 24-26 Holstein, Bill, 74 Holt, Cameron, 128-29 Homeland Security, Department of, 18,105,209,213-14,215 honeypots, 202 IANA (Internet Assigned Numbers Authority), 189 IBM, 57-58 ICANN (Internet Corporation for Assigned Names and Numbers), 190 incentive structure for corporations, 237 India’s bans on TikTok, 65 Indo-Pacific Economic Framework, 159 Industroyer, 8 In-Q-Tel, 211 In re Caremark International, 200-201 In re Clovis Oncology, 200-201 Instagram, 80, 176—77 Intel, 159-60,161 275
Index intellectual property, China’s thefts of, 43-46. See also Chinese thefts of defense technology International Court of Justice, 224-25 international law, 7,10,222-26 internet: beginnings, 171,189-90; expansion, xii; as house of cards, 105-6; influence of, 171-72; next-generation version, 239. See also cloud computing; cloud computing vulnerabilities; social media; social media accountability measures Internet Assigned Numbers Authority (IANA), 189 Internet Corporation for Assigned Names and Numbers (ICANN), 190 Internet of Things, ix, 66 Internet Research Agency (IRA), 82-83, 84-86 Interstate Commerce Commission, 184 The Interview (film attack), 6-7 Ionov, Aleksandr Viktorovich, 85 iPhone hacks, 164—65 IRA (Internet Research Agency), 82-83, 84-86 Iran: distributed denial-of-service attack, 6; Lincoln College attack, 34; ransomware threat from, 20; Stuxnet attack on, 3—5; testing legal boundaries, 225-26 Iraq, 71,129-30 Israel, 3-5,223 Japan, 158 JBS Foods, 34 Joint Cyber Defense Collaborative (JCDC), 233,235-37 Jyan, Howard, 74,99,231 Khan, Lina, 186 KillDisk, 8 Kittner, Cristiana, 12 Klein, Ezra, 100 Korea, 158 Kosseff, Jeff, 176 Krause, Felix, 65 Krebs, Chris, x, 209 Lawfare article, 235 Lazarus Group, 20 Le, Vinhcent, 221 Lee, Doowan, 77,191,237, 240,241 “letters of marque and reprisal” analogy, 9-10 Li, Joanne, 62 Lincoln College, 34 LinkedIn, 96,196 Linux kernel, 103-6 Linvill, Darren, 90 Liska, Allen, 36 Livelink logs, 41 Lockerman, Frank, 64 Log4j code, 104-6 Louis, Gilman, 235 276
Index low-orbit satellites, 191,203 Mallory, Kevin Patrick, 96 malware, 5-6, 8, 9,108. See also ransomware; spear phishing; supply-chain attacks managed service providers (MSPs), 57-58 Mandiant, 11,12-13,49-51, 95, 137-38,140 Mapping China’s Tech Giants project, 70 Marchand v. Barnhill, 200-201 marketplace of validated cybersecurity vendors, 235-36 marketplaces on dark web, 29 Marriott International, 56-57 Mattis, James, 14 McFadden, Brian, 41 McGregor, James, 150-52 McKinsey Company estimates, 240 McLaughlin, Michael, 56,235 medieval castle analogy, 115—17 memory forensics, 48 Messing with the Enemy (Watts), 83-84 Meta Platforms, 240. See also Facebook; Instagram Meyers, Adam, 106-7 Micron Technology, 161 micro-segmentation of networks, 201-2 Microsoft: Activision Blizzard, 240; Azure’s public cloud, 120; Chinese operations, ix-x; data centers in China, 59-60; domain servers, 47-48; Exchange service attack, 107-8, 264n35; human-operated ransomware, 30—31; Minecraft, 104-5; Netscape crippled by, 185; Outlook code, 103; PowerShell, 196-97; working with NewsGuard, 98 Microsoft Threat Intelligence Center (MSTIC), 20 military transports, 136 Minecraft, 104-5 Ministry of State Security (MSS), 75,108,109,138-41 MIT Technology Review article, 105 MLPS 2.0 (Multi-Level Protection System), 59 Monaco, Lisa, 207-8,210 monopolists, 184-85 Montgomery, Mark, 205-6,218, 219,228,233 Moore, Richard, xi Moser, Harry, 166—69 MSPs (managed service providers), 57—58 MSS (Ministry of State Security), 75,108,109,138-41 MSTIC (Microsoft Threat Intelligence Center), 20 Multi-Level Protection System
(MLPS 2.0), 59 277
Index Nadelstichtaktik (needle prick), 223-24 Nakamoto, Satoshi, 33 Nakasone, Paul, 14,17,207 Natana nuclear facility, 3-5 National Academies of Sciences, Engineering, and Medicine report, 81-81 national cyber director, 218 National Defense Authorization Act, 207 National Defense Industrial Association, 128 National Digital Reserve Corps, 211 National Guard, 214—15 National Institute of Standards and Technologies (NIST), 13, 108-9,210 National Interest article, 59 National Security Agency (NSA), 5,16-17 national security presidential memorandum (NSPM), 15 Netscape, 185 networks: federal government creating, 237; interconnectivity of, ix; of private sector, 17-18; security and perimeters of, 11517,201-2,204,263nl3; tactics for gaining access to, 30—31. See also cloud computing; cloud computing vulnerabilities; internet NEW Cooperative cyberattack, 34 278 Newport Wafer Fab, 156 NewsGuard, 96-98 New York Times article, 163 Nexperia, 156-57 Nicaragua, 224—25,265n51 NIST (National Institute of Standards and Technologies), 13,108-9,210 normative aggregation, 222-23 Nortel Networks, 39-42, 44-49,51 North Korea, 6-7,20,225-26 NotPetya, 5—6, 7 NSA (National Security Agency), 5,16-17 NSPM (national security presidential memorandum), 15 numbing strategy, vii Office of Foreign Asset Control (OFAC),20 Office of Management and Budget (OMB), 195 Office of Personnel Management (OPM) data attack, 55-56 OMB (Office of Management and Budget), 195 Onion Router (TOR), 27-28 open-source software authenticity, 193-94 operational capability, 230 Operational Technology (ОТ), 249-50n45
Index private sector collaboration; strategies for corporations; specific corporations public and private sector collaboration: fusion center for sharing information, 234-35,237-38; importance of, 228-30; marketplace of validated cybersecurity vendors, 235-37,238; summary of recommendations, 237-38; in Taiwan, 231-33; War Production Board in World War II, 227-28; weather event comparison, 233-34 public cloud, 118 Pushkov, Vasily V, 87 Putin, Vladimir, v, 243 ОРМ (Office of Personnel Management) data attack, 55-56 Orion software, 6 Ovide, Shira, 230 Palantir (software company), 71 Palestine Liberation Organization (PLO), 223 Penetrium, 66 People’s Liberation Army (PLA), 44, 70, 75,130,137-38,158 The Perfect Weapon (Sanger), 8 PLO (Palestine Liberation Organization), 223 politics in United States, 84—86, 243-44 Popp, Joseph L., 21-23 Postel, Jon, 189-90 PowerShell, 107,196-97 “Preserving the Chokeholds” report (CSET), 157-58 private cloud, 118-19 private sector: cloud threats in, 124-25; government shaping behavior of, 237; investors and globalization, 159-61; management ignoring hacks and threats, 48-49, 52, 61; networks, 17—18; profit motive, xii, 73, 76-78,124-25,230; ransomware strategy, 21; retreating from globalization, 153-54; role in cybersecurity, 76,102. See also public and Qiao Liang, 130 “the Quad,” 159 RaaS (ransomware-as-a-service), 24-26,28,31-32 Radchenko, Sergey, 88 radio communication, 92-93 ransomware: about, ix, x, 19-21; administrative credentials as goal of, 31; Colonial Pipeline attack, 32-34,228; DarkSide, 32-34; inception of, 21-23; as multibillion-
dollar industry, 23-26; originating in Russia, 9; RaaS notifying victim, 31-32; REvil group, 34, 36; as risk to 279
Index all sectors, 23; spear phishing, 29-30,51,64,203; tactics for gaining access to networks, 30-31 ransomware-as-a-service (RaaS), 24-26,28,31 rare earths, 169-70 Reagan, Ronald, xii The Record reports, 202 reports on cyber incidents, 202, 208-9 repository poisoning, 103 reshoring efforts, 165-69,170 REvil ransomware group, 34, 36 Rid, Thomas, 86 Roe v. Wade, 174 RT as news source, 97, 98 Russia: centralized government controlling, 77; Chinese cooperation with, 87-88; Conti group, 20, 36; intentions of, xi, 21; as new face of cyber warfare, 7-10; stopping short of aggression, 8,10; testing legal boundaries, 225-26. See also Russian cyber warfare; Russian government agencies; Ukraine, cyber attacks on; Ukraine, invasion of Russian cyber warfare: cloud computing and, 124; data theft strategy, 54, 67—68; disinformation, 81—87, 97, 99; “letters of marque and reprisal” analogy, 9—10; malware, 5—6, 8, 9; REvil, 34; “Sandworm,” 8,263nl4; Saudi Arabian oil refinery, 35; SiegedSec, 84; SolarWinds, 6, 7,16—17,106-7, 229-30,235 Russian government agencies: Federal Security Service, 36, 83-84, 85,248nl6; Internet Research Agency, 82-83; military intelligence service (GRU), 8-9, 82-84,263nl4; SVR, 6, 84,106 Russofile.com, 97-98 Ryan, Paul, 165 SaaS (software-as-a-service) applications, 58,118 “safe city,” 66 SafeGuard Cyber, 81, 90 SAFE TECH (Safeguarding against Fraud, Exploitation, Threats, Extremism and Consumer Harms) Act, 180,188 Samsung Electronics, 161 Sanger, David, 8 Sarsour, Linda, 85-86 Saudi Arabian oil refinery, 35 Schlein Ted, 202 Schmidt, Eric, 242 script kiddies, 25
Sea Dragon program, 142,144-45 search engine optimization (SEO), 90-91 280
Index SEC (Securities and Exchange Commission), 18,161,200,204 Section 230,175-79,187 Securities and Exchange Commission (SEC), 18,161, 200,204 security clearance information, 70-71 semiconductor industry: about, 154-55; China’s interest in, 152,153; goals of U.S. in, 158-63; manufacture of chips, 158-60; manufacture of equipment, 155,156-58; reinvigoration of, 168-69 Semiconductor Manufacturing International Corporation (SMIC), 154 SEO (search engine optimization), 90-91 SESTA (Stop Enabling Sex Traffickers Act), 177 Sherman Antitrust Act, 184—85 Shields, Brian, 40-42,46—49, 51, 59, 60 ShutDownDC group, 174 signatures, 202 Silex Microsystems, 156 “Silicon Twist” report (CSET), 158 Silk Road, 29 single-factor authentication, 30 “smart city,” 66 281 SMIC (Semiconductor Manufacturing International Corporation), 154 Snowden, Edward, 43 Soble, Stephen, 111-14,197-99 social credit scores, 61 social engineering, 29-30 Social Engineering (Hadnagy), 30 social media: AI and, 99; algorithms, 80; Americans addicted to, 80-81; China’s use of, 94-95; fake accounts and reports on, 171-73; false narratives in, vi; as part of solution, xii-xiii; right to anonymity, 173-75; role of advertising, 96-99. See also Facebook; Instagram; LinkedIn; social media accountability measures; TikTok; Twitter; WeChat social media accountability measures: antitrust policies, 184-87,188; banning Chinese platforms, 182—84,188; cooperating with Europe and Japan, 187,188; enforcing FARA, 180-81; exploring WeChat prohibitions, 183-84, 188; influencers’ disclosure of advertisers, 181—82; labeling advertisements
from foreign governments, 180-82,188; legislation pending, 180,188; middleware tools for, 179-80,
Index 187; reforming Section 230, 175-79,187; summary of recommendations, 187-88 software: licensing of developers, 195-96,204; patches for, 10910,112,203; responsibilities of companies providing, 204; SaaS applications, 58; workforce shortages in industry, 206,218-22. See also software vulnerabilities; specific software applications software vulnerabilities: background, 101-3; Black on, 108-11; levels of, 113; Linux kernel, 103-6; NotPetya, 5-6, 7; “persistent access,” vii—viii; pervasiveness of, 113-14; Soble on, 111-14; supply chain attacks, 3-5, 6,106—8,121-23 software-as-a-service (SaaS), 58, 118 SolarWinds software, 6, 7,16—17, 106-7,229-30,235 spear phishing, 29-30,51, 64,203 Special form 86 (security clearance), 56 splinternet, 190-91 Sputnik television, 87, 98 Sri Lanka, 53 STEM education, 221 Stop Enabling Sex Traffickers Act (SESTA), 177 strategies for corporations: accepting network perimeters 282 are everywhere, 201-2; auto industry comparison, 194-95; building low-orbit satellites, 191,192-93; cybersecurity, 193-97; improved decision making in corporate world, 197-201; layers of protection, 201-3; multiplicity of steps in, 191-92; problem with creating splinternet, 190-91 Stuxnet, 3—5 Su Bin, 136-37 submarine-launched antiship missiles, 142-43 Sun Tzu, xi, 145,175 supercarriers, 134—35 supply-chain attacks, 3-5, 6, 106-8,121-23 SVR (Foreign Security Service), 6. 84,106 Symantec, 13 Taiwan, 74—76,150,158-59,161, 231-33 Tamari, Shir, 120 TCO (total cost of ownership) formula, 167,168 technology education, 241 telecommunication hacks, 113 television and
disinformation, 93 Tencent Holdings, 61,183-84 Third Way think tank, 217 threat intelligence, 230 Tiananmen Square, 88
Index TikTok: about, 61, 63-66; artificial intelligence and, 72; banning, 188; Chinese government having access to, 132,183; disinformation on, 100 Tong, Wen, 45 TOR (Onion Router), 27-28 Torvalds, Linus, 103-4 total cost of ownership (TCO) formula, 167,168 training needs, 203,218-22,226, 241-42 Transportation Security Agency (TSA), 18 Trump campaign, 82-83 TSA (Transportation Security Agency), 18 TSMC (Taiwan Semiconductor Manufacturing Company), 161 Turpin, Matt, 161 TW Cert, 232 The Twenty-Six Words That Created the Internet (Kossef), 176 Twitter, 89,172,179 Uber analogy, 24-25 Uhuru Movement, 85 Uighur repression, 89, 91,164-65, 169-70 Ukraine, cyber attacks on, 5-6, 8-9 Ukraine, invasion of: Chinese narrative on, 87-88; consequences of sanctions, 34-36; Conti group and, 20; politics and, 243; Russian people unaware of war crimes, 81; Uhuru group and, 85 Ulbricht, Ross “Dread Pirate Roberts,” 29 uncategorized groups (UNC), 51 Unit 61398,17,42,50-51,55, 137-38,139-40 United Nations, 223—25 universities, xiv Unrestricted Warfare (Qiao and Wang), 130 U.S. government. See federal government; federal government recommendations; specific governmental agencies and departments U.S. Navy, 58,130-35,139-40, 141-42 U.S. race relations, 94—95 U.S.-Taiwan Initiative on 21st-Century Trade, 159 VAST-OSINT, 191 venture-capital firms, 159, 202,211 Viasat, 192 Vippi Media, 91—92 VirusTotal. com, 15 wafer fabrication, 156 Walker, Kent, 193 Wall Street Journal reports, 159-60 Wang Xiangsui, 130 283
Index WannaCry ransomware, 20 War Production Board, 227-28 Watts, Clint, 83-84 weather event analogy, 233-34 WeChat, 61-63,175,183-84,188 “white hat” hackers, 63, 64 Wikileaks, 82 “Wilson Edwards,” 90 Wingtech Technology, 156—57 Winter Olympics, v, 91-92 wiretaps, 77 Wiz (cloud security firm), 120 Women’s March, 85—86 workforce shortages, 206,218-22 World Internet Conference, 193 284 Wray, Christopher, 127,143 Xiaomi, product, 76 Xi Jinping, v, xii, 10-11,131,151 Xinjiang Province, 169-70 Yantar, 67—68 Yazici, Volkan, 105 Yeshitela, Omali, 85 Young, Tyler, 206 zero-day exploits, 4-5 Zhao Lijian, 89, 94-95 Zoom, 61, 72,188 Zuckerberg, Mark, 185,239-40 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | McLaughlin, Michael G. Holstein, William J. 1951- |
author_GND | (DE-588)1305817117 (DE-588)1305818318 |
author_facet | McLaughlin, Michael G. Holstein, William J. 1951- |
author_role | aut aut |
author_sort | McLaughlin, Michael G. |
author_variant | m g m mg mgm w j h wj wjh |
building | Verbundindex |
bvnumber | BV049100264 |
ctrlnum | (OCoLC)1403378843 (DE-599)BVBBV049100264 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03561nam a2200685 c 4500</leader><controlfield tag="001">BV049100264</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231129 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230814s2023 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781633889019</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-63388-901-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1403378843</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049100264</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McLaughlin, Michael G.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1305817117</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Battlefield cyber</subfield><subfield code="b">how China and Russia are undermining our democracy and national security</subfield><subfield code="c">Michael G. McLaughlin and William J. Holstein</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Essex, Conneticut</subfield><subfield code="b">Prometheus Books</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 285 Seiten</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are"</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / Government policy / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">SOCIAL SCIENCE / Sociology / General</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Holstein, William J.</subfield><subfield code="d">1951-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1305818318</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-63388-902-6</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034361808&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Register // Gemischte Register</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BSB_NED_20231129</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034361808</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">471</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">330.09</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">330.09</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">51</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">471</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">51</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090513</subfield><subfield code="g">73</subfield></datafield></record></collection> |
geographic | Russland (DE-588)4076899-5 gnd USA (DE-588)4078704-7 gnd China (DE-588)4009937-4 gnd |
geographic_facet | Russland USA China |
id | DE-604.BV049100264 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:32:27Z |
indexdate | 2024-07-10T09:55:20Z |
institution | BVB |
isbn | 9781633889019 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034361808 |
oclc_num | 1403378843 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XIV, 285 Seiten 24 cm |
psigel | BSB_NED_20231129 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Prometheus Books |
record_format | marc |
spelling | McLaughlin, Michael G. Verfasser (DE-588)1305817117 aut Battlefield cyber how China and Russia are undermining our democracy and national security Michael G. McLaughlin and William J. Holstein Essex, Conneticut Prometheus Books [2023] XIV, 285 Seiten 24 cm txt rdacontent n rdamedia nc rdacarrier "The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are" Information warfare (DE-588)4461975-3 gnd rswk-swf Russland (DE-588)4076899-5 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf Cyberterrorism / United States Cyberterrorism / Government policy / United States Information warfare / United States Computer networks / Security measures / United States Computer networks / Security measures Cyberterrorism Information warfare United States SOCIAL SCIENCE / Sociology / General USA (DE-588)4078704-7 g Russland (DE-588)4076899-5 g China (DE-588)4009937-4 g Information warfare (DE-588)4461975-3 s DE-604 Holstein, William J. 1951- Verfasser (DE-588)1305818318 aut Erscheint auch als Online-Ausgabe 978-1-63388-902-6 Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034361808&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Register // Gemischte Register |
spellingShingle | McLaughlin, Michael G. Holstein, William J. 1951- Battlefield cyber how China and Russia are undermining our democracy and national security Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4076899-5 (DE-588)4078704-7 (DE-588)4009937-4 |
title | Battlefield cyber how China and Russia are undermining our democracy and national security |
title_auth | Battlefield cyber how China and Russia are undermining our democracy and national security |
title_exact_search | Battlefield cyber how China and Russia are undermining our democracy and national security |
title_exact_search_txtP | Battlefield cyber how China and Russia are undermining our democracy and national security |
title_full | Battlefield cyber how China and Russia are undermining our democracy and national security Michael G. McLaughlin and William J. Holstein |
title_fullStr | Battlefield cyber how China and Russia are undermining our democracy and national security Michael G. McLaughlin and William J. Holstein |
title_full_unstemmed | Battlefield cyber how China and Russia are undermining our democracy and national security Michael G. McLaughlin and William J. Holstein |
title_short | Battlefield cyber |
title_sort | battlefield cyber how china and russia are undermining our democracy and national security |
title_sub | how China and Russia are undermining our democracy and national security |
topic | Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare Russland USA China |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034361808&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT mclaughlinmichaelg battlefieldcyberhowchinaandrussiaareunderminingourdemocracyandnationalsecurity AT holsteinwilliamj battlefieldcyberhowchinaandrussiaareunderminingourdemocracyandnationalsecurity |