| Introduction |
|
xi | |
|
1 Crime, Terrorism, Spying, and War |
|
|
1 | (24) |
|
Cyberconflicts and National Security |
|
|
1 | (3) |
|
Counterterrorism Mission Creep |
|
|
4 | (3) |
|
Syrian Electronic Army Cyberattacks |
|
|
7 | (1) |
|
The Limitations of Intelligence |
|
|
8 | (3) |
|
Computer Network Exploitation vs. Computer Network Attack |
|
|
11 | (2) |
|
iPhone Encryption and the Return of the Crypto Wars |
|
|
13 | (3) |
|
Attack Attribution and Cyber Conflict |
|
|
16 | (3) |
|
Metal Detectors at Sports Stadiums |
|
|
19 | (2) |
|
|
|
21 | (4) |
|
|
|
25 | (6) |
|
|
|
25 | (3) |
|
Reassessing Airport Security |
|
|
28 | (3) |
|
|
|
31 | (42) |
|
|
|
31 | (1) |
|
Security Risks of Embedded Systems |
|
|
32 | (4) |
|
Samsung Television Spies on Viewers |
|
|
36 | (2) |
|
Volkswagen and Cheating Software |
|
|
38 | (3) |
|
DMCA and the Internet of Things |
|
|
41 | (2) |
|
Real-World Security and the Internet of Things |
|
|
43 | (4) |
|
Lessons from the Dyn DDoS Attack |
|
|
47 | (3) |
|
Regulation of the Internet of Things |
|
|
50 | (3) |
|
Security and the Internet of Things |
|
|
53 | (16) |
|
|
|
69 | (1) |
|
IoT Cybersecurity: What's Plan B? |
|
|
70 | (3) |
|
4 Security and Technology |
|
|
73 | (16) |
|
The NSA's Cryptographic Capabilities |
|
|
73 | (3) |
|
iPhone Fingerprint Authentication |
|
|
76 | (2) |
|
The Future of Incident Response |
|
|
78 | (3) |
|
Drone Self-Defense and the Law |
|
|
81 | (2) |
|
Replacing Judgment with Algorithms |
|
|
83 | (4) |
|
|
|
87 | (2) |
|
|
|
89 | (10) |
|
Candidates Won't Hesitate to Use Manipulative Advertising to Score Votes |
|
|
89 | (2) |
|
The Security of Our Election Systems |
|
|
91 | (2) |
|
|
|
93 | (3) |
|
Hacking and the 2016 Presidential Election |
|
|
96 | (3) |
|
6 Privacy and Surveillance |
|
|
99 | (56) |
|
Restoring Trust in Government and the Internet |
|
|
99 | (3) |
|
The NSA Is Commandeering the Internet |
|
|
102 | (2) |
|
Conspiracy Theories and the NSA |
|
|
104 | (2) |
|
How to Remain Secure against the NSA |
|
|
106 | (4) |
|
|
|
110 | (4) |
|
Why the NSA's Defense of Mass Data Collection Makes No Sense |
|
|
114 | (3) |
|
Defending Against Crypto Backdoors |
|
|
117 | (4) |
|
A Fraying of the Public/Private Surveillance Partnership |
|
|
121 | (2) |
|
Surveillance as a Business Model |
|
|
123 | (2) |
|
Finding People's Locations Based on Their Activities in Cyberspace |
|
|
125 | (3) |
|
Surveillance by Algorithm |
|
|
128 | (4) |
|
|
|
132 | (1) |
|
Everyone Wants You to Have Security, But Not from Them |
|
|
133 | (3) |
|
|
|
136 | (1) |
|
Automatic Face Recognition and Surveillance |
|
|
137 | (4) |
|
The Internet of Things that Talk about You behind Your Back |
|
|
141 | (2) |
|
Security vs. Surveillance |
|
|
143 | (2) |
|
|
|
145 | (3) |
|
Congress Removes FCC Privacy Protections on Your Internet Usage |
|
|
148 | (2) |
|
Infrastructure Vulnerabilities Make Surveillance Easy |
|
|
150 | (5) |
|
7 Business and Economics of Security |
|
|
155 | (14) |
|
|
|
155 | (3) |
|
The Public/Private Surveillance Partnership |
|
|
158 | (2) |
|
Should Companies Do Most of Their Computing in the Cloud? |
|
|
160 | (5) |
|
Security Economics of the Internet of Things |
|
|
165 | (4) |
|
8 Human Aspects of Security |
|
|
169 | (20) |
|
Human-Machine Trust Failures |
|
|
169 | (2) |
|
Government Secrecy and the Generation Gap |
|
|
171 | (2) |
|
Choosing Secure Passwords |
|
|
173 | (4) |
|
The Human Side of Heartbleed |
|
|
177 | (2) |
|
The Security of Data Deletion |
|
|
179 | (1) |
|
Living in a Code Yellow World |
|
|
180 | (2) |
|
Security Design: Stop Trying to Fix the User |
|
|
182 | (2) |
|
Security Orchestration and Incident Response |
|
|
184 | (5) |
|
9 Leaking, Hacking, Doxing, and Whistleblowing |
|
|
189 | (40) |
|
Government Secrets and the Need for Whistleblowers |
|
|
189 | (4) |
|
Protecting Against Leakers |
|
|
193 | (2) |
|
Why the Government Should Help Leakers |
|
|
195 | (2) |
|
Lessons from the Sony Hack |
|
|
197 | (3) |
|
Reacting to the Sony Hack |
|
|
200 | (3) |
|
Attack Attribution in Cyberspace |
|
|
203 | (2) |
|
|
|
205 | (2) |
|
The Security Risks of Third-Party Data |
|
|
207 | (3) |
|
The Rise of Political Doxing |
|
|
210 | (1) |
|
|
|
211 | (4) |
|
Credential Stealing as an Attack Vector |
|
|
215 | (1) |
|
Someone Is Learning How to Take Down the Internet |
|
|
216 | (2) |
|
Who Is Publishing NSA and CIA Secrets, and Why? |
|
|
218 | (4) |
|
Who Are the Shadow Brokers? |
|
|
222 | (4) |
|
On the Equifax Data Breach |
|
|
226 | (3) |
|
10 Security, Policy, Liberty, and Law |
|
|
229 | (52) |
|
Our Newfound Fear of Risk |
|
|
229 | (3) |
|
|
|
232 | (2) |
|
The Battle for Power on the Internet |
|
|
234 | (7) |
|
How the NSA Threatens National Security |
|
|
241 | (3) |
|
Who Should Store NSA Surveillance Data? |
|
|
244 | (3) |
|
|
|
247 | (2) |
|
Disclosing vs. Hoarding Vulnerabilities |
|
|
249 | (5) |
|
The Limits of Police Subterfuge |
|
|
254 | (2) |
|
When Thinking Machines Break the Law |
|
|
256 | (2) |
|
The Democratization of Cyberattack |
|
|
258 | (2) |
|
Using Law against Technology |
|
|
260 | (3) |
|
Decrypting an iPhone for the FBI |
|
|
263 | (2) |
|
Lawful Hacking and Continuing Vulnerabilities |
|
|
265 | (2) |
|
The NSA Is Hoarding Vulnerabilities |
|
|
267 | (4) |
|
WannaCry and Vulnerabilities |
|
|
271 | (4) |
|
NSA Document Outlining Russian Attempts to Hack Voter Rolls |
|
|
275 | (2) |
|
Warrant Protections against Police Searches of Our Data |
|
|
277 | (4) |
| References |
|
281 | |