• Complain

Landau - Listening in: cybersecurity in an insecure age

Here you can read online Landau - Listening in: cybersecurity in an insecure age full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: New Haven, year: 2018;2017, publisher: Yale University Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Listening in: cybersecurity in an insecure age
  • Author:
  • Publisher:
    Yale University Press
  • Genre:
  • Year:
    2018;2017
  • City:
    New Haven
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Listening in: cybersecurity in an insecure age: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Listening in: cybersecurity in an insecure age" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Racing into the digital revolution -- Were all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- Theres no turning back.;New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a countrys electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.--Inside dust jacket.

Landau: author's other books


Who wrote Listening in: cybersecurity in an insecure age? Find out the surname, the name of the author of the book and a list of all author's works by series.

Listening in: cybersecurity in an insecure age — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Listening in: cybersecurity in an insecure age" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Listening In

Listening In

Cybersecurity in an Insecure Age

SUSAN LANDAU

Yale UNIVERSITY PRESS

New Haven and London

Copyright 2017 by Susan Landau.

All rights reserved.

This book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers.

Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e-mail (U.K. office).

Set in Minion type by Integrated Publishing Solutions,

Grand Rapids, Michigan.

Printed in the United States of America.

Library of Congress Control Number: 2017944412

ISBN 978-0-300-22744-4 (hardcover : alk. paper)

A catalogue record for this book is available from the British Library.

This paper meets the requirements of ANSI/NISO Z39.48-1992 (Permanence of Paper).

10 9 8 7 6 5 4 3 2 1

Dedicated to my walking buddiesboth two- and four-legged
without whom this book would not have been written
.

Contents
Preface

In February 2016 the Judiciary Committee of the US House of Representatives invited me to testify on encryption. Cryptography protects data in motioncommunicationsand data at restparticularly data stored on smartphones, laptops, and other digital devicesfrom prying eyes. The encryption issue has bedeviled US law enforcement since the early 1990s. Because encryption was becoming a default on consumer devices, law enforcements worst fears were finally coming true. Not only were smart criminals and terrorists using encryption to hide their plans, as they had been doing so for quite some time, but now the less savvy ones were as well.

FBI director James Comey was pressing Congress to require that exceptional access be built into encryption systems, enabling law enforcement to access communications or open devices with legal authorization. But the FBIs seemingly simple request was anything but. If you make it easier to break into a communication system or a phone, its not just government agents with a court order who will get in. Bad guys, including criminals and other sophisticated attackers, will also take advantage of the system. Weakening security is exactly the wrong move for a world fully dependent on digital communications and devices to conduct personal, business, and government affairs.

This argument is not new; for quite some time my colleagues and I have been saying that securitypersonal, business, and national securityrequires widespread use of strong encryption systems. That means encryption systems without back doors, front doors, or any other form of easy access. But while encryption undoubtedly makes investigations harder to conduct, law enforcement has alternative tools at its disposal. This was the message I was bringing to Congress.

The congressional hearing played out against the background of a dispute between Apple and the FBI involving a locked iPhone. In December 2015, two terrorists in San Bernardino, California, killed fourteen members of the county Health Department. The terrorists themselves were killed in a shootout, but the FBI recovered extensive evidence related to their plans, including an Apple iPhone issued by the county to one of the perpetrators, who had been employed by the Health Department. The FBI sought to have Apple write software to unlock the phones security protections. When the company refused to do so, the law enforcement agency took Apple to court, which initially ruled in the governments favor.

At the Judiciary Committee hearing, James Comey railed against warrant-proof spaces and the difficulties locked devices presented to keeping Americans safe. Apples general counsel and I presented a different narrative: in a world of increasing cyberattacks, communications and data required stronger protections. Weakening them is the last thing we should be doing. Surely the FBI could find other ways to open the phoneessentially hacking in under a court order (a practice known

Discussion raged for weeks. Which approach offers more security? Forcing Apple to undo the protections the company had carefully designed for the iPhone? Or leaving these protections in place, potentially not accessing the terrorists communications, but leaving everyone elses phone secure? Then, after having testified in court and in Congress that only Apple could undo the phones security protections, the FBI had a surprise announcement. Law enforcement didnt need Apples help after all; a contractor had found a way to unlock the phone. The immediate problem of Apples secure phone went away.

The problem of that particular iPhone had been resolved, but the FBIs fear of going darkof losing the ability to listen in or collect data when this information was encryptedremained. As spring turned to summer, I found myself explaining over and over the complexities of our digital worldhow much we stored on our devices, how much data was at risk, how easy it was to break into systems, and how useful phones might be for authenticating ourselves and thus preventing that theft. Our cybersecurity risks have intensified over the last two decades as the Internet has become an integral part of peoples personal and business lives. In the wake of the Judiciary Committee hearing, I spoke on this topic in Washington, DC, California, South Korea, and Germany; at the National September 11 Memorial and Museum; and on NPR and the BBC. But it was clear that many more people needed to understand the complexities and risks of the situation than I could reach with my talks. I decided to write this book.

That was August 2016. But even as I was writing, the story was changing in remarkable ways. For decades policymakers

The Russians, who have long used disinformation as a technique for influencing events, turned the tools of cyberexploitation against the Democratic Party and, in particular, Hillary Clintons presidential candidacy. Using common forms of cyberattack, the Russians stole emails from the DNC, the Democratic Congressional Campaign Committee, and from the private account of John Podesta (chair of Clintons presidential campaign). The email leak, combined with false news stories that were favorable to Republican candidate Donald Trump and unfavorable to Clintonand Twitter bots that brought them much attentionwere new forms of disruption. The leaks and false news drove US press stories and attention, creating a very negative effect for Clinton in the waning days of the 2016 election. This Russian attack was different from anything the United States had anticipated when the military had practiced cyberwar games.

The issue of cybersecurity was no longer only about preventing Chinese hackers from stealing fighter plane plans to use for their own military, or about the US militarys use of sophisticated cyberattack weapons to destroy centrifuges at an Iranian nuclear facility (as discussed in the chapters that follow). Now it was about protecting vastly larger swathes of societythe press, universities, research organizations (the latter

When the FBI supports exceptional access, and tech companies resist it, the FBI is not weighing the demands of security versus privacy. Rather, it is pitting questions about the efficiency and effectiveness of law enforcement against our personal, business, and national security. Instead of security versus privacy, this is an argument of security versus security. And although the FBIs goals are to improve law enforcements ability to conduct investigations, the proposed meansweakening encryption and the security of phonesrisk a far greater harm.

The encryption debate, a subject that previously occupied only techies and policy wonks, has now become critically important to national security. How do we secure ourselves in the face of the Digital Revolution, in which our world is increasingly being controlled through bits? This revolution has brought humanity tremendous economic, technological, scientific, and cultural benefits. But it also provides bad actors with the ability to steal and disrupt at a distance, performing serious mischief at scale.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Listening in: cybersecurity in an insecure age»

Look at similar books to Listening in: cybersecurity in an insecure age. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Listening in: cybersecurity in an insecure age»

Discussion, reviews of the book Listening in: cybersecurity in an insecure age and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.