The hack of the Democratic National Committee by the Russian government and the subsequent publication of confidential emails during the 2016 US presidential election elevated cyber security in the context of international affairs to an unprecedented level in the public’s consciousness, not only in the United States but around the world.
“‘There’s probably no issue that’s become more crucial, more rapidly, but is less understood, than cybersecurity,’ warns cyber expert P.W. Singer, co-author of Cybersecurity and Cyberwar: What Everyone Needs to Know. Cybersecurity has quickly become one of the most defining challenges of our generation, and yet, as the threat of cyber-terrorism looms, there remains an alarming “cyber-awareness gap” that renders the many of us vulnerable.
After writing Cybersecurity and Cyberwar: What Everyone Needs to Know, P.W. Singer compiled a list filled with songs to help readers get into the vibe of the book, which explores the emerging security challenges that continue to arise in the new digital age.
For centuries, international law has functioned as an instrument of nation-states working in concert, acting out of a sense of legal obligation. Since World War II, this combination of state practice driven by legal obligation—in the form of both treaties and customary international law—has served as a prime mechanism for shaping and addressing complex global responses to pressing planetary challenges.
Facebook has been in the hot seat since it came to light that personal data on as many 87 million users, mostly in the U.S., had been improperly acquired by Cambridge Analytica for use in the presidential campaign of Donald J. Trump. CEO Mark Zuckerberg acknowledged as well that “malicious” outsiders may have accessed profiles of most of his two billion users. In the wake of Facebook’s enormous cyber-lapse, Congress investigated, users fled, and its stock plummeted, the makings of a genuine company disaster.
The Blackstone’s Police team will soon be attending the 10th International Conference on Evidence Based Policing and 2nd Cybercrime Conference in Cambridge. In advance of the event, take a look through the timeline below to learn more about some of the key events in the recent history of cyber crime. Don’t forget to come to the Oxford University Press stand and say hello if you’re attending the conference!
Hackers working on behalf of the Russian government have attacked a wide variety of American citizens and institutions. They include political targets of both parties, like the Democratic National Committee, and also the Republican National Committee, as well as prominent Democrat and Republican leaders, civil society groups like various American universities and academic research programs.
As the aftershocks of last week’s big “WannaCry” cyberattack reverberate, it’s worth taking a moment to think about what it all means. First, ransomware is a growing menace, and this may be the case that gets it global attention. The idea behind ransomware is simple: no one is willing to pay as much as you for your data. Instead of copying critical data and trying to sell it to others, ransomware authors will simply deny their target access until payment is made.
When discussions arise about the utility of cyber-attacks in supporting conventional military operations, the conversation often moves quickly to the use of cyber-attacks during Russia’s invasion of Georgia in 2008, the US decision not to use cyber-attacks in the 2003 invasion of Iraq, or Russia’s behavior in cyber-space surrounding the conflict with Ukraine that began in 2014. These, however, may not really be the most useful cases to examine.
Scenarios are often mistaken for forecasts, expert predictions, or simulations. They are none of these. Instead, scenarios depict possible future states of the world by combining theory and story-telling in rigorous and resonant ways to facilitate creative thinking. The Geneva experience is not important because the financial crisis scenario happened to be prescient. Rather, it serves to illustrate how hemmed in our thinking about the future can be.
Recently, INTERPOL announced it had coordinated the shutdown of close to 5,000 websites illegally selling medicines online. Dubbed “Operation Pangea IX”, this ninth annual international week of action against illicit online pharmacies boasted the participation of over 103 countries from a multi-stakeholder coalition, led to 393 arrests, and resulted in the seizure of $53 million dollars worth of potentially dangerous medicines.
Oxford University Press is excited to be welcoming Professor Steve Furber as the new Editor-in-Chief of The Computer Journal. In an interview between Justin Richards of BCS, The Chartered Institute of IT and Steve, we get to know more about the SpiNNaker project, ethical issues around Artificial Intelligence (AI), and the future of the IT industry.
The widespread practice of uploading photographs onto internet social networking and commercial sites has converged with advances in face recognition technologies to create a situation where an individual can no longer be just a face in the crowd. Despite the intrusive potential of face recognition technologies (FRT), the unauthorised application of such technologies to online digital images so as to obtain identity information is neither specifically prohibited nor a critical part of the international law reform discourse.
Does the word cyber sound dated to you? Like the phrases Information Superhighway and surfing the Web, something about the word calls one back to the early era of the Internet, not unlike when you ask a person for a URL and they start to read off, ‘H-t-t-p, colon, forward slash…’
Modern society requires a reliable and trustworthy Internet infrastructure. To achieve this goal, cybersecurity research has previously drawn from a multitude of disciplines, including engineering, mathematics, and social sciences, as well as the humanities. Cybersecurity is concerned with the study of the protection of information – stored and processed by computer-based systems – that might be vulnerable to unintended exposure and misuse.
Compiled by Jonathan Kroberger
Our publicity department spends all week long talking about our books and occasionally they find it hard to stop talking about them when out and about. Here on the blog we’re going to be featuring some of the facts they can be heard recounting outside of the office from some of our current books.