Catalog Search Results
Author
Series
Tom Clancy's Op-Center volume 1
Pub. Date
2017.
Description
Former US Ambassador to the Ukraine Douglas Flannery meets with an old friend and former spy near New Yorkś South Street Seaport. She is seeking his help to thwart a Russian plan to overrun her native Ukraine, but those for whom she is working propose an infinitely more dangerous scheme, one that could draw in NATO forces and possibly ignite World War III. Moments later, as she jogs along the East River, her throat is slashed. Within hours, Op-Center...
Author
Pub. Date
[2022]
Description
"A chilling account of Russian information warfare, Putin's Trolls exposes the individuals and organizations behind the Kremlin's coordinated, military-style social media operations against the West. In this courageous and unflinching book, award-winning journalist Jessikka Aro interweaves her own dramatic story as a target of Russian social media propaganda with accounts from many internationally known critics of the Kremlin, who share their own...
Author
Pub. Date
2019.
Description
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than 2 minutes. From hacking into voting machines to more mundane, but no less serious problems, our democracy faces unprecedented tests from without and within. In Democracy In Danger, Braun, a veteran of 3 presidential campaigns and former...
Author
Formats
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...
Author
Pub. Date
2017.
Description
"A veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states--such as Russia, China, Iran, and North Korea--and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States....
Author
Pub. Date
[2023]
Description
"Andreas Krieg examines how state and nonstate actors weaponize narratives in the information space to subvert a target audience or government. One of the most important contributions of the work is his argument that these subversive information operations can achieve strategic, not just tactical effects, through a six-stage process. Subversive information operations rely on networks consisting of a range of virtual, human, and organizational surrogates...
Author
Pub. Date
2018.
Description
"Clint Watts electrified the nation when he testified in front of the Senate Select Committee on Intelligence regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don't hack your computer, they hack your mind. Watts reveals how these malefactors use your social media information and...
Author
Pub. Date
[2017]
Description
"War in 140 Characters examines the role of social media and other forms of 'new media' in changing the face of modern warfare. War is, more than ever, a clash of narratives--with each state/party fighting to control the spread of information and project their narrative to the outside world. Social media has shattered traditional hierarchies between the state and its citizens, enabling the individual or networks of individuals to influence the direction...
Author
Series
Pub. Date
[2014]
Description
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from...
12) Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Pub. Date
[2018].
Description
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...
Author
Series
Pub. Date
2023.
Description
"A Firehose of Falsehood: The Story of Disinformation breaks down disinformation tactics and offers tools for defending and restoring truth. Using examples from Darius I of ancient Persia (522-486 BCE), to blood libel of the Middle Ages, to Soviet disinformation tactics and modern election deniers, Teri Kanefield and Pat Dorian show how tyrants and would-be tyrants deploy disinformation to gain power. Democracy, which draws its authority from laws...