Free Essay

Russian Patriotic Hacking

In:

Submitted By mmmm1982
Words 8586
Pages 35
Russian Patriotic Hacking During Operation Allied Force

Introduction.

With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating regardless of its size. Global governments need to continue working on creating workable laws that accurately describe the problem of cyberattacks and effectively enforce the solution. The modern world still has a long way to go before all security threats are addressed, appropriate defence is in place and all the critical computer infrastructure is protected from hackers, “hacktivists” and plain criminals.

As a computer professional and a native Russian, I have a personal interest in conducting research on the ongoing cyber-conflict between countries that represent some of the major players in today’s computerized war arena, Russia and the United States of America being only the two of them. I do remember the bombings of Belgrade in 1999 and the nationwide outrage that followed those attacks. As a brother-slavic nation we all wanted to support Yugoslavia on its way to the independence and craved revenge against NATO and its evil allies. Looking back at that situation I realize all of us were exposed to a great deal of misinformation, misinterpretation and manipulation by government and government-owned news media, that was pursuing a hidden political and military agenda. Later on in life when I became involved in Information Technology and have worked in the field for several years, I started to understand the technical background of those hacker attacks. I do not wish to defend any member of the Chaos Hackers Crew, nor do I want to defend or offend anyone else associated with the Operation Allied Force.

So called “first world countries” with well-developed economies, that heavily rely on computers and technology, are not the only ones under the pressure from global cyber-threat trends. According to MessageLabs Intelligence 2008 Annual Security Report (Emerging markets at greater risk of cybercrime, 14 January, 2009) developing countries, such as Brazil, India, China are at even higher risk of exposing themselves to cyber-threats, and could potentially become the next launchpad for the next cyber-attack against the United States. As Internet access penetrates deeper into the emerging market and World Wide Web becomes more readily available in those place where computers are cheap enough, technical education appeals to the highest standards, but laws or other roadblocks are not in place yet to prevent the cybermafia from appearing and thriving, more and more problems arise in countries like Turkey, China and Russia, where botnets are on the rise, Denial of Service attacks become a daily occurrence and governments are unable to do anything to prevent such actions from happening not only on the international scale, but in their own backyard.

This case study will allow me to answer my own questions, as well as the questions of the global society, including people directly involved in the Cyber Conflict Case Study, security professionals, government agencies and field academics, on the hot issue of cyber-conflict. In the light of recent and not-so-recent events, such as 1999 Yugoslavia conflict, topic of defining the problem itself first have arisen. This paper is structured around fundamental issues tempestuously discussed by the cyberconflict community as well as controversial arguments that are relevant in this particular case of Russian Patriot Hacking during NATO’s Operation Allied Force. Each section contains multiple subsections, each of which reveal a separate question or a set of questions to be addressed. As recommended by the Case Study guide I will be focusing on topics involving international relationships and inter-cultural differences, legislative and moral sides of the story as well as computer security and technical education that also need to be covered.

In the first segment on intercultural and international issues will be uncovering the somewhat mystical and obscure myth of Russian culture, with its stereotypes and conspiracies dating back to the USSR and beyond. Undoubtedly in the depth of Russian soul, moral values, the Cold War based technical education and Russian legal system, lay the reasons behind the strong response expressed by numerous cyber-attacks on the United States and NATO back in 1999 with further exploration the possible large-scale effects of future cyberattacks. I’m sure the reader will be interested in knowing exactly how a possible foreign or even domestic digital aggression could be accomplished, what attack mechanics would be used and how will the victim be affected, whether if it the government of the United States, a federal agency, a major enterprise or an individual computer user. It would be exceptionally fascinating to find out what kind of economic effect would sizable cyberattack have on the financial district, critical infrastructure (i.e utilities, transportation) and the economy overall.

The second section of the report will be focusing on legal and ethical issues facing cyberwarfare research community. First and foremost we need to precisely define what actions constitute a cybercrime? How do cybercrimes against individuals, property and government differ? And at which point does a cybercrime become a cyberwar? The paper will demonstrate the ethical side of the story where the Russian mentality and absence of computer regulations and cyber laws play a humongous role in allowing the so-called cyber-mafia and other hacktivists to thrive and to continue to carry on its “cyber-activities” virtually unpunished. Digital law enforcement is crucial, but unfortunately practically non-existent today, therefore investigating and executing cyber-criminals should be considered the first priority, and is well mentioned in this section. This section will touch on different cyberconflict related legislations around the world being developed right now, and how they would affect the United States and the future of computerized violence, if passed. Furthermore, expanding on the problems of establishing trust among computer and government entities in peacetime and during conflict through the utilization of encryption, digital trust certificates and other comprehensive security policies.

The entire third part of the paper is dedicated to identifying and resolving some of the security issues we will have to deal with during a cyberconflict. The biggest one of them all is how can we protect ourselves? Defense strategies discussed in this subsection include personal protection, safeguarding data and infrastructure on government and enterprise level with the focus on military instances. Acknowledging certain desperate areas of mandatory improvement, where the United States is lacking resources tremendously. Technical education and cyberwarfare leadership development is one of them. Communication during cyberwarfare is an important part of this discussion. Just like during any type of war, being aware of which communication channels will fail first and examples of effective ways of transmitting information discovered during the crisis of September 11 and Northeast blackouts in 2003 will give us a good idea about the necessary preparation steps in this state of constant cyberwar awareness. Lastly I would like to comment on the impact of hacktivists, and patriotic hackers such as Chaos Hackers Crew and most recently Anonymous on the way we conduct digital wars and what we have learned from their attacks.

Intercultural and international issues.

“You'll never grasp her with your mind
Or cover with a common label,
For Russia is one of a kind -
Believe in her, if you are able.”
Fyodor Tyutchev

In order to explain the reasons behind Russian patriotic hacking during the Operation Allied Force back in 1999, we need to first get a better understanding of Russian culture with its beliefs, moral values, language background, legal and educational systems. I will be able to provide some useful insights on this issue, as I consider myself to be a subject-matter expert. The question of moral values rises as soon as comes the realization that we are unable to comprehend or interpret the behavior of outsiders. Most of the time we believe that foreigners act mysteriously or vulgarly or simply abnormally from what one would expect. In more scientific terms this kind of confusion is classified as "cultural misunderstanding". As a matter of fact, even Russians consider themselves to be somewhat of mysterious creatures; unable to understand each other’s actions, Russian often refer to a “concealed Russian soul”. In the literal translation of a quatrain by a famous 19th century Russian poet at the beginning of this section, the author is talking about his inability to grasp the common sense when it comes to fellow citizens, and the only thing the Russians can do about it, is to believe that everything will work out. The same notion still holds true today.

Most Russians of legal age were raised under the Soviet educational system. Higher education was mandatory during the Cold War Nuclear Arms Race and, so in the 1970s, 1980s and even 1990s Russians were about 99.7% literate (Above Top Secret, 2006). Many Russians traditionally hold either a engineering or other type of highly-specialized technical degree. “The beginning of engineering education in Russia was laid by the foundation of the School of Mathematical and Navigational Sciences in Moscow in accordance with Tsar Peter the Great's Decree dated 27 January 1701. Russia has benefited from 300 years of history in engineering education and the same period of industrial progress.” (Russia Beyond The Headlines, 2008). Best of all this world-class education is free.Today there are millions of Russian computer programmers and well accomplished self-taught hackers who can potentially initiate a successful cyberattack on the United States or any other country as we have witnessed in the example of Georgian government website during the civil war of 2008. With its humiliating minimum wage level, non-existent social security benefits, sky-high unemployment rates and natural population decline, Russia middle class simply does not exist. According to MSK.ru (MSK, 2011) 26% of Russians live below the powerty level. Combine this with the superior education and relatively high average intellectual level and we have a highly explosive nation with Robin Hood complex, ready to revolt and take on anyone who seems to be acting unfair.

Russia’s spiritual life has historically been influenced by 2 main religions: Russian Orthodoxy (a branch of Christianity) and Islam. Russian Muslims are not connected to any of the radical Muslim movements of the Middle East, such as Wahhabi, and therefore shall not be considered risky from the warfare point of view. Due to the 80 years of religion-prohibitive communist regime, many of Russians are currently atheists, although most of them still consider themselves religious, but at reality almost never go to church. Overall religion doesn’t possess enough leverage to influence any military or political decisions in the country and should be omitted for the purpose of this paper.

Nonetheless, there are explicit and widely acceptable biblical commandments, such as, “Thou shall not kill.”. However, in today’s world commandments such as, “Thou shall not steal” prove to be rather questionable. In her article, Svetlana Babayeva, a political writer, gives the following example: “a corporation manager who knows that his boss is extorting money. How should he react and how should he view his superior? Not in the sense of direct practical actions, like “whistle blowing” to the upper management, or reporting the theft to the Prosecutor’s Office, but simply in the evaluative sense? Should the boss be admired because he is so shrewd and has panache for such behavior? Or should he be despised because he robs from the corporation and country, and consequently, robs his subordinates – both employees and people? Or should it all be ignored because there is no way to stop such activities anyways and hence a waste of time and effort?”(Russia in Global Affairs, 8 August 2007). The answer is: to ignore. The acceptance that "everyone steals" has wiped out the nation's sense of right and wrong. Those who are engaged in embezzlement and bribery accept it as the only way to carry on and thrive. They feel protected because "everyone else is doing it." The police are infamous for being corrupt top to bottom. It is quite normal to break traffic regulations in Russia, and then it’s absolutely expected to bribe the policeman who pulled over the car. As a result Russians have developed a “Creative attitude to law”, which might seem savage to an average law-obedient American. Such widespread disregard for theft, fraud and corruption, along with condemnation of “whistle blowing” works out well for the hackers and other criminals. Their actions are simply ignored and rarely prosecuted. As a result we now have the entire generation of young, well educated, non-religious lower-middle-class citizens, who do not respect the law, but feel very passionate about “doing the right thing”. Those are the people who initiated attacks on White House website and attempted breaking into the US military servers.

Cyberattacks by a foreign government or cyber anti-security specialist secretly hired by a foreign government is a very effective way of political and economical pressure that is most of the time virtually impossible to trace back to the origin. Russian hackers seem to be the leaders of being blamed for such attacks. Patriotic hacking during the civil war in Georgia in 2008 could serve as another example of a powerful computer attack on a foreign government. This time Russian internet community not only didn’t try to cover their traces, but openly and proudly admitted involvement and their primary role in those events. “Information war”, as they call it, was not planned and started rather spontaneous. No one expected this type of response to actions of a foreign, even though a formerly friendly USSR, government. It was a very emotional time for all those “Robin Hoods” in underground hacker clubs. Slowly but surely main Georgian websites were taken down: personal blog of the President, official Georgian parliament website, the Secret Service information page, various websites and forums for federal government services and ministries. These attacks lasted for weeks, but not a single non-government website was touched, because it “was not their fault”. Georgia’s officials were astonished and crashed under such pressure. They couldn’t stop the civil war, but they sure dedicated a lot of time, resources and money to counter the cyber enemies. Nonetheless those attacks were effective in disrupting government services and successfully accomplished the goal of applying political and most importantly psychological pressure on the subject of their attack.

Cyberattacks can cause major destruction without necessarily being large-scale. “In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks. Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government.” (Clay Wilson, 2008). Estonia has a large percent of native Russian population, and the removal of a statue of a Soviet soldier celebrating the end of World War II caused a civil movement and criticism by the Russian Government. The Russian government was immediately accused by Estonian officials of the cyberattacks, and charged them with unlawful cyberwarfare. Denial of Service attacks targeted Estonian government and private sector sites. They affected various parts of the infrastructure, including the government websites and email servers, causing the Members of the Estonian Parliament to go for days without email access, banks and news outlets. Financial transactions were severely compromised, ATMs were practically disabled, the largest national bank had to suspend all online activity for almost 24 hours. Independent analysts argued that the cyberattack involved cooperation between the Russian government and plain cybercriminals, who created new or made their existing botnets available for short-term rent. This particular case makes it evident that cyber-aggression can cause serious damage without being large-scale.

Beside being a major inconvenience, like in the example of government worker being without email for several days, cyberattacks can cause considerable financial and economical damage. According to AOL Government (AOL Government, 2011), almost 75 million people fell victim to the invisible computer crime in the United States in the year of 2010. Most definitely the number has gone up since then, but in the same year electronic criminals caused $32 billion in personal financial losses. Numbers vary when it comes to the private sector, but considering that in most international and US stock markets and nearly all critical infrastructure are run by computer that are connected directly to the Internet, it makes them hypersensitive to any type of attacks.

Lets look at the example of September 11 attacks. Even though these were not cyberattacks per se, the opening of the New York Stock Exchange (NYSE) was delayed and later cancelled that day, NYSE remained closed for almost a week along with the New York Mercantile Exchange, US Bond Market also closed, London Stock Exchange was evacuated; all of this caused the global stock and bond market to drop sharply and remain unstable for years. Flights all over the United States, Canada and some other countries were grounded causing billions in damage and even a couple of bankruptcies. Attacks themselves resulted in approximately $40 billion in insurance losses alone, making it one of the largest economic crises in history.

When it comes to the U.S. critical infrastructure, such as power, water and electric utility companies, there has been an alarming trend of more and more increasing break in attempts. “Security at power companies has been a concern for decades, but the issue rose to prominence with the emergence last year of the Stuxnet malware, which exploits holes in Windows systems and targets a specific Siemens SCADA (supervisory control and data acquisition) program with sabotage. After dissecting the malware, experts say they believe it was written to target nuclear facilities in Iran.” (CNET, April 18 2011). If the Stuxnet-like malware creators do succeed and a significant part of the country is affected by, let’s say, a power outage, it will cause serious economic consequences. Just like back in 2003, when the entire Northeast was hit by a widespread power outage, which lasted for over 12 hours, upset water supply, transportation, communication and many more sides of our lives, and caused over $5 billions in damage (Electricity Consumers Resource Council, 2004).

Military infrastructure is also quite susceptible to any computer-related intrusion since most of it is controlled by computers and there are plenty of viruses and malware, as described above, out to infect it. The two most recent cases take us back to 2010 and 2011. In the summer of 2010 Israel released malware into the uranium-enrichment centrifuge control center in Iran, which led to multiple explosions, service disruption and multi-billion monetary loss. Then again just last year Israel unleashed a very sophisticated virus, which infected the central microprocessor of the newest Iranian ballistic missile, causing it to explode. Dozens of high-ranked military commanders were killed, billions of dollars in damage, not to mention the destruction of the priceless fruit of their labor.

Economic impact of the past (cyber)attacks and simple utility malfunctions show that potential economic and financial repercussions could be catastrophic. More than that since the Internet access is becoming universal, America’s largest enterprises, military facilities and government agencies find themselves under fire from hackers all around the globe. Gartner’s Top Predictions for IT Organizations and Users for 2012 and Beyond predicting that by 2016, the financial and economic impact of cyber-crime will increase at 10% per year, because to the on-going detection of new vulnerabilities.(CNET, April 19 2012).

Legal and ethical issues.
“In the prospect of an international criminal court lies the promise of universal justice.”
Kofi Annan

Since the year 2000 the number of reported cyber-crimes has increased greatly, from only 16,000 to over 300,000 (Hurriyet Daily News, 2012). This particular progression doesn’t seem to shows any signs of direction changing tendencies as the number of computers increase every day. However, the main question remains: what actions constitute a cybercrime and cyberwarfare? Official sources offer the most common definition of a cybercrime as "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones”. In a more broader characterization, cyberwarfare is hacking, cracking, computer-related sabotage and undercover activities that are sanctioned by a government and may be politically induced. So the three main targets for cybercrime and cyberwarfare are people, private property and government and military agencies.

Cyber-crimes committed against persons may take different forms such as circulation of child-pornography, cyber-bullying through the means of computers, Internet websites, chat rooms or email. Production, dealing and administration of obscene material, including, but not limited to adult materials, institutes one of the most prevalent cybercrimes today. The inherent future damage of such actions to society cannot be accurately assessed, much less - predicted. Cyber-crimes against property include computer vandalism, account password exposure, credit card fraud, distribution of harmful viruses, malware, spam, and intellectual property theft. US Corporations lose millions of dollars and, more importantly, their reputation through this type of illegal act.

Cyberterrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorise the citizens of a country. This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website. Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. This is exactly what happened to government web servers in Georgia in 2008, the Bank of Estonia in 2007 and finally to the United States and NATO digital infrastructure back in 1999.

Internet access has really been a blessing to US business, Universities and other educational organizations. There are, however, two sides of the coin. Due to its unique characteristics that allows it to penetrate international borders and the anonymity provided by the World Wide Web, it is perfect habitat for those trying to evade the law. Internet related crime is an inevitable reality that all Information Technology security specialists have to be prepared for. Therefore it is important to be aware of any federal and local laws that regulate such activity. There are a couple of important US federal legislations and European Union Conventions that have been enacted to deal particularly with the problem of crime in the computer age.

Cybercrime is not just the problem of threat to personal wallets or home workstations, it is the matter of national security. That is exactly why the US Congress constantly works on bills meant to deal with this issue. The Cyber Crime Protection Security Act (S. 2111), for instance, is designed to “enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks” (A Legal Analysis, 2012). This bill is neither perfect nor comprehensive, but many say it is a very important first step in the fight on cybercrime on American soil. "We are incredibly vulnerable, if we don't make our policy makers think about this seriously, we'll be dealing with something like 9/11" (CNNMoney, 2012) said Mike McConnell, former President Bush's national intelligence director. It might take a catastrophic event for the United States lawmakers to take the threat seriously.

The European Union on the other hand has long realized the importance of cybercrime related laws. The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or simply the Budapest Convention, is the first major international treaty signed in November of 2001, looking into addressing digital crimes and the Internet based illegal activities by correlating national laws, advancing analytical techniques and improving cooperation among European countries. “The Council of Europe helps protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime and its Protocol on Xenophobia and Racism, the Cybercrime Convention Committee and the technical cooperation Programme on Cybercrime” (Council of Europe, 2001).

First computer viruses targeting IBM compatible machines first appeared in Russia over 20 years ago. There has been a significant shift in the entire purpose of such programs: they have gone from being relatively harmless pranks to specialized software for money extraction and extortion. Most companies and regular computer users cannot imagine their lives without the Internet today, they often transmit private and straight confidential information over the Internet, which can be stolen and later sold by criminals. According to director of the Federal Security Agency in Moscow, Russia has one of the most loyal cybercrime legislation in the world, and many criminals exploit it without any fear of being punished. As an example he mentioned a huge database of people, tens of thousands names, who are known for illegal cyber activity such as computer fraud and hacking, but the Agency is puzzled as to what to do with the database as those are not considered crimes according to the Russian law (SecurityLab, 2008). Unfortunately, the cybercrime as a result of information systems globalization issue, is not yet covered whatsoever in the Russian legal system. More than that, Russia is not one of the countries that signed the Budapest Convention on Cybercrime back in 2001. This convention represents years of in-depth analysis of the global cybercrime situation and regrettably Russia is not quite ready to sign it or cooperate in the international effort of containing the problem. However, it would only be fair to mention that even after signing the Convention over ten years ago, the European community is not only still in the process of seeking effective methods of fighting this war, but also haven’t worked out a single unified policy regarding the matter.
At the same time Russian scientist dedicate their time researching potential criminal liability and cybercrime climate inside the country, ignoring the overall global trends in this industry. Russia is yet to realize the pandemic tendency of this issue.

Cyberspace is the fifth common dimension: after land, sea, air and outer space. It is in desperate need for organization, cooperation and legal actions among all countries worldwide. A cyberspace law or treaty at the international level would become the global core structure for order, security and justice in cyberspace. Cyber-peace and computer security ought to be an important part of the dynamic evolution of international law. The most outrageous computer crimes and attacks of global importance shall be investigated and pursued based on newly invented international law, and punished by an international Court or Tribunal for cyberspace.

“In the prospect of an international criminal court lies the promise of universal justice” said Kofi Annan, former UN Secretary-General (An International Criminal Tribunal for Cyberspace, 2012)
Without an international court or tribunal for dealing with the most serious cybercrimes of global concern, many serious cyberattacks will go unpunished. The most serious global cyberattacks in the recent year, have revealed that almost nobody is investigated and prosecuted, and nobody has been sentenced for those acts. Such acts need to be included in a global treaty or a set of treaties, and investigated and prosecuted before an international criminal court or tribunal.

Establishing trust among computers, server entities and users for government, military or private sector purposes, is the most important task for cybersecurity professionals right now. There are several means for achieving such goals. A digital signature is a mathematical pattern for proving the authenticity of a computer relation, message or document. A credible digital signature gives both sides of a digital transaction a reason to trust that the message was created by a known sender, and that it was not changed in transit. Digital signatures are widely used in software development and, online bank transactions, and in other web based activities when there is a potential threat of fraud or interfering.

Another mean of protecting important Internet communication channels is encryption. It is a mechanism of conversion of otherwise openly transmitted information into and impenetrable scrambled messages to broadcast it through insecure mediums. The most popular encryption algorithm assumes the possession of a secret decryption key by both communicating parties. Encryption is currently used for most online transactions, including financial, government and private email communications. It is theoretically impossible to decrypt scrambled messages, however hardware and software solutions otherwise known as “sniffers” have long been used by hackers and other online criminals to intercept and collect such information for brute-force decryption attempts. With the ever-increasing processing speed of modern computers brute-force attacks are becoming more and more successful. US government is infamously known for building huge data-centers, one of them in Bluffdale Utah, meant for collecting encrypted information from all over the world with the plans for decrypting previously uncrackable data in the nearest future when Moore's law will allow supercomputers powerful enough to do so.

To investigate and prosecute cybercrime, law enforcement agencies need experienced investigators, updated computer forensic personnel familiar with the concepts of encryption and digital certificates as well as prosecutors accustomed to cybercrime issues. According to federal and state law enforcement officials, “the pool of qualified candidates is limited because those investigating or examining cyber-crime must be highly trained specialists, requiring detective and technical skills, including knowledge of various IT hardware and software, and forensic tools” (Digital Communities, 2009).

Security issues.

"If you don't lock your car, it's vulnerable; if you don't secure your computer, it's vulnerable"
(FBI Cyber Division, 2011)

Large organized crime groups have been launching massive attacks against individuals and major enterprises for decades. They have successfully managed steal billions of dollars every year, and a large, ongoing presence in many of our most sensitive computer systems.
Organized cybercrime is a truly international affair, but the most advanced attacks tend to stem from Russia. The Russian mob is incredibly talented for a reason: “After the Iron Curtain lifted in the 1990s, a number of ex-KGB cyberspies realized they could use their expert skills and training to make money off of the hacked information they had previously been retrieving for government espionage purposes” (CNNMoney, July 27, 2011).

It’s obvious that the only 100% protected computer network is the one that is in no way connected to the Internet, however it is not realistic to expect everyone to disconnect at once and go into an offline mode. Just like it is a common sense to lock the car and house every night, computer information systems should be securely protected from possible intrusions. Here are some of the most common ways. Operating Systems should be patched against all vulnerabilities in a timely manner. Known vulnerability exploitation is the most popular way for hackers to get in. Antivirus and antispyware software should be installed to catch harmful programming code while browsing the Internet or checking email. IT staff should implement strict firewall rules to avoid unnecessary risk of cyberattacks through the most common ports. Password rules should be in place for private companies and most importantly government agencies and military instances to enforce complex password use. Staff should be trained to deal with social engineering attempts. In the public sector organizations, security policies should restrict unauthorized access to sensitive data. When a government employee leaves the agency, immediately disconnect their access to the company’s network and physical access to the building, shut down remote connections, collect their cell phones and smartphones. Heavily encrypted wireless connections should be used within the organizations to prevent unauthorized access. Virtual Private Networks (VPN) use should be enforced for access from outside.

US economy has shifted from a manufacturing based economy to an information based economy a long time ago. “Between 1995 and 2005, the U.S. lost 3 million manufacturing sector jobs and created 17 million service/information sector jobs. The service/information based sector will dominate the U.S. economy in coming decades” (HigherEdUtah, 2010). Jobs available in the past required hard labor skills; present and future jobs will require“ highly educated technical specialists. In order for the United States to create leaders and personnel in computer security field to protect the government digital assets, students need to be taught how to solve technical problems, which require the application of knowledge from many different disciplines and the laboratory provides a medium to develop and test solutions. American businesses increasingly complain about the lack not only in up-to-date technical skills training of job applicants, but also in the “employability skills” creativity, problem-solving skills, teamwork, leadership, self-esteem and integrity that are indispensable to productivity in today’s workplace. The shortage of qualified skilled workers has reached acute proportions in nearly every sector of American industry. Asian, South American and European countries, including Russia with its Chaos Hackers Crew, place a much higher cultural and governmental value on the achievement of technical skills. This is where the American education system has been lacking.

The breakdown of essential communications is one of the most widely shared characteristics of all disasters. Looking back at cyberattacks on Estonia in 2007 and communication failure on September 11, whether partial or complete, the breakdown of telecommunications infrastructure leads to preventable loss of life and damage to property, by causing delays and errors in emergency response and disaster relief efforts military or civilian crews. Yet despite the increasing reliability and resiliency of modern telecommunications networks to physical damage, the risk associated with communications failures remains serious because of growing dependence upon these tools in emergency operations. In case of a military crisis or a cyberattack it is believed that North American Aerospace Defense Command (NORAD) will be the first target as a communication center. NORAD is a joint organization of Canada and the United States that provides aerospace warning, air sovereignty, and defense for the two countries. Headquarters NORAD is located at Peterson AFB, Colorado Springs, Colorado. NORAD command and control is exercised through the Cheyenne Mountain Operations Center, located a short distance away.

In case of massive failure of communication systems such as the Internet, landlines and cell phones, radio will be be the most reliable mean of information exchange for civil and military purposes. Just like during the September 11 attacks Radio Communications served a vital role in coordinating rescue efforts by the New York Police Department, New York Fire Department, Port Authority Police Department, and Emergency Medical Services. Victims of Hurricane Katrina reserved to using ham radios to communicate with each other and the rest of the world right after the disaster, as most telephone service in New Orleans and coastal Mississippi remained devastated.

On the battlefield communication is critical. During a cyberwar the best defence is offence and enemy’s communication channels should be taken out right away. Communication warfare can take many forms: television and radio transmissions can be jammed or hijacked for disinformation purposes, logistics networks should be disabled or spoofed. Stock exchange transactions can be easily sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation. Defense Advanced Research Projects Agency (DARPA) has developed two modes of operation for a new technology back in 2009, known as PREW (for Precise Electronic Warfare). “One method, called point-to-an-area, will utilize an ad hoc array of transmission nodes that are precisely synchronized to project energy on a limited location in space -- an area, say, 100 meters across -- from as far as 20 kilometers away. Which frequencies DARPA will jam is their little secret, of course, but the idea is to knock out GPS satellite navigation, CB-type radio bands, and cell phone signals. So if friendly troops are conducting operations in an area and command wants to disable an enemy communications bunker or a missile installation, for instance, it can simply jam signals in that precise area without knocking out friendly communication links nearby” (Popular Science, 2009).

Organized cybercrime groups have made a huge impact on thy way cyber warfare is conducted in today’s world. Anonymous for example, is an Internet hacker organization that originated in 2003 and represents the concept of many online and offline community users simultaneously existing as an uncontrolled, digitized global mind. It is also generally considered to be a blanket term for members of certain Internet subcultures, a way to refer to the actions of people in an environment where their actual personalities are unknown. Even though they are considered to be hackers, members of the Anonymous organization think of themselves as “hacktivists”, meaning that they are out there to spread goodness and fairness. They, for instance, attack pedofile websites and servers of hosting companies that allow such activities on their watch. They are famous for the “Operation Revenge” on some of the major payment systems out there like Visa and Mastercard when those decided to freeze assets of the famous WikiLeaks creator. In its recent report Verizon, that has been tracking Anonymous since the very beginning, wrote: "2011 saw a merger between those classic misdeeds and a new 'oh by the way, we're gonna steal all your data too' twist.This re-imagined and re-invigorated specter of 'hacktivism' rose to haunt organizations around the world."(CNNMoney, March 22, 2012)

At 14:00 EST on March 24, 1999 NATO initiated the first air strike against strategic military targets in the Federal Republic of Yugoslavia. While the causes of ceasing the violence and repression by President Milosevic could be considered noble, significant civilian casualties as well as legitimacy of the entire operation were widely criticized the international community. The most notable response to the bombings were numerous cyberattacks by Russian computer enthusiasts group Chaos Hackers Crew and other hacktivists, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts and countless spamming storms. “This was the most primitive kind of attack, and it was less of an attack and more of a demonstration. The fact that our response was uneven and disorganized should worry us. The fact that some of the [U.S. government sites] did crash makes you wonder how well prepared we are to respond to a more sophisticated attack, if one were to occur” (Internet Telephony Magazine, 2010).

Conclusion

While the term cyberattack is well defined and computer professionals know exactly what it is and where it comes from, there are not enough laws in the United States or globally that would help prevent, control or enforce punishment for such actions. The cyberterrorism threat is real now more than ever, and it is important to be prepared through technical means: known vulnerabilities patching, antivirus protection, password and physical access policies. In case of an actual cyber threat government instances and military will have to reserve to radio communications based on the experience of past catastrophic events, and proactively attack the enemy’s communication channels, whoever it might be. Lessons of Anonymous and Chaos Hackers Crew need to be learned and highly trained security professionals should be standing by ready for a Denial of Service attack on critical infrastructure, while using encryption and digital trust certificates to protect valuable assets and for access control.

War is an organized and armed conflict between countries, carried out with extreme aggression and usually high mortality. Cyberwar is a conflict between two enemies using political pressure through the means of computer software, hardware and networks, that could be potentially lethal. There has not been a single cyberattack that could be classified as cyberwar so far, but it doesn’t mean that there never will be. There’s no such thing as total preparedness to an attack or a cyberattack. Government and private sector need to heavily invest into defensive security measures. A more complex approach to our security measures needs to be taken, as the cybersecurity threats we are facing have evolved beyond the ability of current technologies to neutralize them, and all indications are that they will continue to do so.

Bibliography

“Are the Russians More Prepared for Nuclear War?” Above Top Secret, December 25, 2006. http://www.abovetopsecret.com/forum/thread237244/pg7.
Babaeva, Svetlana. “Free from Morality, Or What Russia Believes In Today.” Russia in Global Affairs, August 8, 2007. http://eng.globalaffairs.ru/number/n_9124.
Baranov, Anatoliy. “Russian Living Standards Are Catastrophicaly Low (Уровень Жизни в России Катастрофически Снижается).” MSK.ru, February 18, 2011. http://forum-msk.org/material/news/5554163.html.
Benjamin Bidder. “Russian Hackers Target Political Opposition.” Spiegel Online, July 30, 2007, sec. World. http://www.spiegel.de/international/world/0,1518,497841,00.html.
“Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress”, n.d. https://docs.google.com/viewer?a=v&q=cache:Zuwrdtx3cswJ:www.fas.org/sgp/crs/terror/RL32114.pdf+They+argue+that+as+the+rented+time+expired,+the+intensity+of+the+persistent+cyberattacks+against+Estonia+also+began+to+fall+off&hl=en&gl=us&pid=bl&srcid=ADGEESjRKeJkDDfq74QY63iqwWUWETsykI4bBOH110zTkUVbsGjCcalrLtmiQ2c-ro_R-5dZKe93eiD5S2B5_QNBIIWlUgVgarrE_T08uvASwcM38RJC9AEPynyY03c9H-U0ExMI7WIR&sig=AHIEtbRjWTBlUTjL8AklloLpIWyjt7y6xw.
“Career and Technical Education–An Answer to a Problem.” HigherEdUtah.org, April 5, 2010. http://www.higheredutah.org/career-and-technical-education-an-answer-to-a-problem/.
Cavelty, Myriam Dunn. Cyber-Security and Threat Politics: US Efforts to Secure the Information Age. 1st ed. Routledge, 2007.
Chris, Marsden. “US-NATO Bombing of Yugoslavia: Critical Reports Circulate on the Internet.” World Socialist Web Site, April 20, 1999. http://www.wsws.org/articles/1999/apr1999/nato-a20.shtml.
Chris Nuttall. “Kosovo Info Warfare Spreads.” BBC, April 1, 1999, sec. Sci/Tech. http://news.bbc.co.uk/2/hi/science/nature/308788.stm.
Clay Wilson. “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress”, January 29, 2008. https://docs.google.com/viewer?a=v&q=cache:Zuwrdtx3cswJ:www.fas.org/sgp/crs/terror/RL32114.pdf+They+argue+that+as+the+rented+time+expired,+the+intensity+of+the+persistent+cyberattacks+against+Estonia+also+began+to+fall+off&hl=en&gl=us&pid=bl&srcid=ADGEESjRKeJkDDfq74QY63iqwWUWETsykI4bBOH110zTkUVbsGjCcalrLtmiQ2c-ro_R-5dZKe93eiD5S2B5_QNBIIWlUgVgarrE_T08uvASwcM38RJC9AEPynyY03c9H-U0ExMI7WIR&sig=AHIEtbRjWTBlUTjL8AklloLpIWyjt7y6xw.
Coleman, Kevin. “Cyber Intelligence: The Huge Economic Impact of Cyber Crime.” AOL Government, September 19, 2011. http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economic-impact-of-cyber-crime/.
“Convention on Cybercrime”. Council of Europe, 2001. http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm.
Cooper, Charles. “House Hearing: U.S. Now Under Cyber Attack”, April 24, 2012. http://news.cnet.com/8301-1009_3-57420229-83/house-hearing-u.s-now-under-cyber-attack/?part=rss&subj=news&tag=title.
“Cyber Assaults: The New Organized Crime”, n.d. http://www.tmcnet.com/voip/0110/cyber-assaults-the-new-organized-crime.htm.
“Did Russians Get Whitehouse.gov?”, n.d. http://www.wired.com/politics/law/news/1999/03/18787.
Dilow, Clay. “DARPA Wants ‘Precision Jamming’ To Take Enemies Out of the Conversation.” Popular Science, August 25, 2009. http://www.popsci.com/military-aviation-amp-space/article/2009-08/darpa-wants-precision-jamming-take-enemies-out-conversation.
Dmitri, Skryabin. “Russian Hackers Started the War on NATO(Российские Хакеры Вступили в Войну Против НАТО).” Translated by Ryumshin Mikhail. Den. Kiev, Ukraine, April 2, 1999. http://www.day.kiev.ua/107883.
Doyle, Charlel. Cybersecurity: Cyber Crime Protection Security Act (S. 2111). A Legal Analysis, March 12, 2012. http://www.fas.org/sgp/crs/misc/R42403.pdf.
“Estonians Accuse Kremlin of Cyberwarfare.” Spiegel Online, May 17, 2007, sec. World. http://www.spiegel.de/international/world/0,1518,483394,00.html.
France-Presse, Agence. “Davos Call for Global Action Against Cybercrime.” Hurriyet Daily News, January 26, 2012. http://www.hurriyetdailynews.com/davos-call-for-global-action-against-cybercrime.aspx?pageID=238&nID=12349&NewsCatID=374.
Francois, Paget. “Cybercrime and Hacktivism”. McAfee Labs, n.d. http://www.mcafee.com/us/resources/white-papers/wp-cybercrime-hactivism.pdf.
Frankel, Ben. “Cyber Attacks on Critical Infrastructure Reach U.S.” Homeland Security News Wire, November 21, 2011. http://www.homelandsecuritynewswire.com/cyber-attacks-critical-infrastructure-reach-us-bf.
Goldman, David. “Cybersecurity Bills Aim to Prevent ‘Digital Pearl Harbor’.” CNNMoney, April 23, 2012. http://money.cnn.com/2012/04/23/technology/cybersecurity-bills/index.htm.
———. “‘Hacktivists’ Stole 58% of Thieved Data in 2011.” CNNMoney, March 22, 2012. http://money.cnn.com/2012/03/22/technology/hacktivists-verizon-data-breach-report/index.htm.
———. “The Cyber Mafia Has Already Hacked You.” CNNMoney, July 27, 2011. http://money.cnn.com/2011/07/27/technology/organized_cybercrime/index.htm.
Halder, Debarati. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations, n.d.
Harrison, Erin. “Cyber Assaults: The New Organized Crime.” Internet Telephony Magazine, January 2010. http://www.tmcnet.com/voip/0110/cyber-assaults-the-new-organized-crime.htm.
Hell_man, Ryumshin Mikhail, and Leibov Roman. “Exclusive Investigation (Эксклюзивный Инвестигатив)”, April 8, 1999. http://gazeta.lenta.ru/nl/08-04-1999_hackers_Printed.htm.
Hopkins, Mark. “FBI to Create International Cyber-Law Enforcement Agency.” Mashable, March 20, 2008. http://mashable.com/2008/03/20/fbi-cyberlaw/.
“In Bleak Russia, a Young Man’s Thoughts Turn to Hacking - New York Times”, n.d. http://www.nytimes.com/2000/06/29/technology/in-bleak-russia-a-young-man-s-thoughts-turn-to-hacking.html?pagewanted=all&src=pm.
Jill Dougherty. “Computer Hacking in Russia Cheap and Widespread.” CNN, March 5, 1999. http://edition.cnn.com/WORLD/europe/9903/05/russia.hackers/index.html.
JOHN SCHWARTZ. “Yugoslavia’s Hackers Wage War via Net.” Houston Chronicle Archives, April 1, 1999. http://www.chron.com/CDA/archives/archive.mpl/1999_3128519/balkans-war-yugoslavia-s-hackers-wage-war-via-net.html.
Journal, Jeremy Wagstaff Staff Reporter of the Wall Street. “The Internet Could Be the Site Of the Next China-U.S. Standoff.” Wall Street Journal, n.d. http://online.wsj.com/article/SB98856633376453558.html?mod=googlews.
Julia, Latynina. “Russian Trolls(Российские Тролли и Китайские Хакеры).” Translated by Ryumshin Mikhail. Novaya Gazeta. Moscow, Russia, March 14, 2012. http://www.novayagazeta.ru/columns/51605.html.
Kenneth Geers. “Cyberspace and the Changing Nature of Warfare.” SC Magazine, August 27, 2008. http://www.scmagazine.com/cyberspace-and-the-changing-nature-of-warfare/article/115929/.
Kenneth, Geers. “Hacking in Foreign Language: A Network Security Guide to Russia.” Presentation, Amsterdam, 2005. http://www.blackhat.com/presentations/bh-europe-05/bh-eu-05-geers-up.pdf.
Lysyanskaya, Anna. Signature Schemes and Applications to Cryptographic Protocol Design. Massachusetts Institute of Technology, September 2002. http://groups.csail.mit.edu/cis/theses/anna-phd.pdf.
Mikhail, Ryumshin, trans. “Russian Hackers Against NATO (Российский Хакеры Против НАТО).” Blog. BugTraq, April 6, 1999. http://bugtraq.ru/review/archive/1999/06-04-99.html.
Mills, Elinor. “Cyber Attacks Rise at Critical Infrastructure Firms.” Cnet, April 18, 2011. http://news.cnet.com/8301-27080_3-20055091-245.html.
“Nato Strikes: The First Week.” BBC, April 9, 1999, sec. Kosovo. http://news.bbc.co.uk/2/hi/special_report/1998/kosovo/312003.stm.
Nusca, Andrew. “Can the U.S. Prevent a Digital Sneak Attack?” Cnet, April 19, 2012. http://news.cnet.com/8301-1009_3-57417292-83/can-the-u.s-prevent-a-digital-sneak-attack/.
“Operation Allied Force.” U.S. Department of Defense, June 21, 1999. http://www.defense.gov/specials/kosovo/.
Perry, Alex. “Getting Out the Message.” Time, undefined 2001. http://www.time.com/time/magazine/article/0,9171,1957488,00.html.
Posner, Vladimir. “No Freedom of Speech in Russian Media.” The Other Russia, March 28, 2008. http://www.theotherrussia.org/2008/03/28/no-freedom-of-speech-in-russian-media%E2%80%94tv-personality/.
“Protect Your Computer.” FBI, 2011. http://www.fbi.gov/scams-safety/computer_protect/computer_protect.
“Protecting Europe Against Large-scale Cyber-attacks.” European Union Committee, 2010. http://www.publications.parliament.uk/pa/ld200910/ldselect/ldeucom/68/6805.htm.
“Protecting Europe Against Large-scale Cyber-attacks.” Parlament.uk, 2010, sec. BACKGROUND TO THE INQUIRY. http://www.publications.parliament.uk/pa/ld200910/ldselect/ldeucom/68/6805.htm.
“Rise of Cyber-attacks Continues.” Security & Defence Agenda, May 9, 2011. http://www.securitydefenceagenda.org/Contentnavigation/Library/Libraryoverview/tabid/1299/articleType/ArticleView/articleId/2882/Rise-of-cyberattacks-continues.aspx.
Robert S. Dudney. “Rise of the Cyber Militias.” Airforce Magazine, February 2011. http://www.airforce-magazine.com/MagazineArchive/Pages/2011/February%202011/0211cyber.aspx.
Roman, Leibov. “Brotha-Hackers (Братья Наши Хакеры.).” Translated by Ryumshin Mikhail. Lenta, April 15, 1999. http://gazeta.lenta.ru/nl/15-04-1999_hackers2_Printed.htm.
———. “Hacker War on Nato(Hаши Хакеры Бомбят НАТО).” Translated by Ryumshin Mikhail. Gazeta, April 8, 1999. http://www.gazeta.ru/nl/08-04-1999_hackers.htm.
“Russia Has the Most Cybercrime-loyal Law in the World. (В России Самое Лояльное Законодательство По Отношению к Киберпреступности).” SecurityLab, May 18, 2009. http://www.securitylab.ru/news/379668.php.
Schjolberg, Stein. Recommendations for Potential New Global Legal Mechanisms Against Global Cyberattacks and Other Global Cybercrimes. An International Criminal Tribunal for Cyberspace, March 2012. http://www.cybercrimelaw.net/documents/ICTC.pdf.
“Snapshot”, n.d. http://www.higheredutah.org/career-and-technical-education-an-answer-to-a-problem/.
“Snapshot”, n.d. http://money.cnn.com//2012/04/23/technology/cybersecurity-bills/index.htm?section=money_topstories&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+rss%2Fmoney_topstories+%28Top+Stories%29.
“Sources CIA Gets Goahead to Destabilize Yugoslavia.” CNN, n.d. http://articles.cnn.com/1999-05-24/us/9905_24_cia.yugoslavia.01_1_covert-operations-sources-cia-computer-hackers?_s=PM:US.
“The Economic Impacts of the August 2003 Blackout”. Electricity Consumers Resource Council, February 9, 2004. https://docs.google.com/viewer?a=v&q=cache:4EZBBpOkAiEJ:www.elcon.org/Documents/EconomicImpactsOfAugust2003Blackout.pdf+Northeast+blackout+of+2003+economic+effect&hl=en&gl=us&pid=bl&srcid=ADGEESi2Vhg3YiKJ2USZN3OL4MfJORu6P2NjJbVN6kqL3Uv0-1sKPavnuQp9HFLb_ZleVK7rPFyE5DxjLDj7Ib_Z8DLoZTyE6TsotJCswi0RPYUHV4BPouJjPVzJ_eUnZQfNw4TNM1kT&sig=AHIEtbSCkvIkCbA1SJHIHj_hTYPVKOZ6dA.
“Ukrainian Hackers ‘Bomb’ NATO servers(Украинские Хакеры ‘Бомбят’ Серверы НАТО и Заказывают По Интеренту Розы Для Любимых).” Blog. UFOlog, June 15, 1999. http://ufolog.h1.ru/haker.htm.
Wolf, Ulf. “Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals.” Digital Communities, January 27, 2009. http://www.digitalcommunities.com/articles/Cyber-Crime-Law-Enforcement-Must-Keep-Pace.html.
Yeo, Vivian. “Emerging Markets at Greater Risk of Cybercrime”, January 14, 2009. http://www.zdnet.co.uk/news/security-management/2009/01/14/emerging-markets-at-greater-risk-of-cybercrime-39591616/.
Zhuraskovsky, Vakkiliy. “Engineering Education in Russia and the Quality Training of Specialists in the Area of High Technologies.” Russia Beyond The Headlines, October 26, 2008. http://rbth.ru/articles/2008/10/26/261008_technologies.html.

Similar Documents

Free Essay

Make Sure You'Re Right, Then Go Ahead

...Red Feather Journal 73 “Be Sure You're Right, Then Go Ahead”: The Davy Crockett Gun Craze by Sarah Nilsen In April 2005, sixty thousand members of the National Rifle Association gathered in Houston, Texas for their 134th Annual Meeting. The keynote speaker for the event was embattled U.S. House Majority Leader, Representative Tom De Lay. After his speech, De Lay was joined on stage by Lee Hamel dressed as Davy Crockett in full buckskin attire and a coonskin hat. Hamel presented De Lay with a handcrafted flintlock rifle that he had made for the event with his mentor, Cecil Brooks. The presentation of the reproduction rifle to De Lay is part of a long NRA tradition that began in 1955 when Walt Disney‟s Davy Crockett series first appeared on television. When Charlton Heston received his handcrafted flintlock rifle in 1989, he uttered his famous words, “From my cold dead hands.” President Ronald Reagan and Vice President Dick Cheney also joined the list of those who received facsimile Davy Crockett flintlock rifles from a man dressed in Crockett buckskin attire. This tradition is part of the NRA‟s efforts to represent the gun as a key instrument in the founding of the United States. It secured this ideological representation in part by appropriating the mythology of early American heroes like Davy Crockett. Davy Crockett became emblematic of the gun mythology of early American life. This mythology was synergized by the NRA and popularized through children‟s television...

Words: 8084 - Pages: 33

Free Essay

Against Joy to Live

...Over the years I have developed a distaste for the spectacle of joie de vivre, the knack of knowing how to live. Not that I disapprove of all hearty enjoyment of life. A flushed sense of happiness can overtake a person anywhere, and one is no more to blame for it than the Asiatic flu or a sudden benevolent change in the weather (which is often joy's immediate cause). No, what rankles me is the stylization of this private condition into a bullying social ritual. The French, who have elevated the picnic to their highest civilized rite, are probably most responsible for promoting this smugly upbeat, flaunting style. It took the French genius for formalizing the informal to bring sticky sacramental sanctity to the baguette, wine and cheese. A pure image of sleeveless joie de vivre Sundays can also be found in Renoir's paintings. Weekend satyrs dance and wink; leisure takes on a bohemian stripe. A decent writer, Henry Miller, caught the French malady and ran back to tell us of pissoirs in the Paris streets (why this should have impressed him so, I've never figured out). But if you want a double dose of joie de vivre, you need to consult a later, hence more stylized version of the French myth of pagan happiness: those Family of Man photographs of endlessly kissing lovers, snapped by Doisneau and Boubat, not to mention Cartier-Bresson's icon of the proud tyke carrying bottles of wine. If CartierBresson and his disciples are excellent photographers for all that, it is...

Words: 7922 - Pages: 32

Free Essay

01. Raymond Benson as David Michaels - Splinter Cell (2004)

...Table of Contents Title Page Copyright Page Acknowledgements Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 Chapter 31 Chapter 32 Chapter 33 Chapter 34 Chapter 35 Chapter 36 Chapter 37 Chapter 38 Chapter 39 Chapter 40 THE BESTSELLING NOVELS OF TOM CLANCY THE TEETH OF THE TIGER A new generation--Jack Ryan, Jr.--takes over in Tom Clancy's extraordinary, and extraordinarily prescient, novel. "INCREDIBLY ADDICTIVE." --Daily Mail (London) RED RABBIT Tom Clancy returns to Jack Ryan's early days-- in an engrossing novel of global political drama . . . "A WILD, SATISFYING RIDE." --New York Daily News THE BEAR AND THE DRAGON A clash of world powers. President Jack Ryan's trial by fire. "HEART-STOPPING ACTION . . . CLANCY STILL REIGNS." --The Washington Post RAINBOW SIX John Clark is used to doing the CIA's dirty work. Now he's taking on the world . . . "ACTION-PACKED." --The New York Times Book Review EXECUTIVE ORDERS A devastating terrorist act leaves Jack Ryan as President of the United States . . . "UNDOUBTEDLY CLANCY'S BEST YET." --The Atlanta Journal-Constitution DEBT OF HONOR It begins with the murder of an American woman in the back streets of Tokyo. It ends in war . . . "A SHOCKER." --Entertainment...

Words: 98950 - Pages: 396

Free Essay

One Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.

...E SSAYS ON TWENTIETH-C ENTURY H ISTORY In the series Critical Perspectives on the Past, edited by Susan Porter Benson, Stephen Brier, and Roy Rosenzweig Also in this series: Paula Hamilton and Linda Shopes, eds., Oral History and Public Memories Tiffany Ruby Patterson, Zora Neale Hurston and a History of Southern Life Lisa M. Fine, The Story of Reo Joe: Work, Kin, and Community in Autotown, U.S.A. Van Gosse and Richard Moser, eds., The World the Sixties Made: Politics and Culture in Recent America Joanne Meyerowitz, ed., History and September 11th John McMillian and Paul Buhle, eds., The New Left Revisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Michael Adas, ed., Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: Solidarity Remembered Janis Appier, Policing Women: The Sexual Politics of Law Enforcement and the LAPD Allen Hunter, ed., Rethinking the Cold War Eric Foner, ed., The New American History. Revised and Expanded Edition E SSAYS ON _ T WENTIETH- C ENTURY H ISTORY Edited by ...

Words: 163893 - Pages: 656

Free Essay

The Fate of Empire

...THE FATE OF EMPIRES and SEARCH FOR SURVIVAL Sir John Glubb John Bagot Glubb was born in 1897, his father being a regular officer in the Royal Engineers. At the age of four he left England for Mauritius, where his father was posted for a three-year tour of duty. At the age of ten he was sent to school for a year in Switzerland. These youthful travels may have opened his mind to the outside world at an early age. He entered the Royal Military Academy at Woolwich in September 1914, and was commissioned in the Royal Engineers in April 1915. He served throughout the first World War in France and Belgium, being wounded three times and awarded the Military Cross. In 1920 he volunteered for service in Iraq, as a regular officer, but in 1926 resigned his commission and accepted an administrative post under the Iraq Government. In 1930, however, he signed a contract to serve the Transjordan Government (now Jordan). From 1939 to 1956 he commanded the famous Jordan Arab Legion, which was in reality the Jordan Army. Since his retirement he has published seventeen books, chiefly on the Middle East, and has lectured widely in Britain, the United States and Europe. William Blackwood & Sons Ltd 32 Thistle Street Edinburgh EH1 1HA Scotland © J. B. G. Ltd, 1976, 1977 ISBN 0 85158 127 7 Printed at the Press of the Publisher Introduction As we pass through life, we learn by experience. We look back on our behaviour when we were young and think how foolish we were. In the same way our family...

Words: 13065 - Pages: 53

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION NOVEMBER 2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 ...

Words: 185166 - Pages: 741

Premium Essay

Managing Cultura Differences

...MANAGING CULTURAL DIFFERENCES SIXTHEDITION MANAGING CULTURAL DIFFERENCES SERIES Managing Cultural Differences: Global Leadership Strategies for the 21 st Century, Sixth Edition Philip R. Harris, Ph.D., Robert T. Moran, Ph.D., Sarah V. Moran, M.A. Managing Cultural Diversity in Technical Professions Lionel Laroche, Ph.D Uniting North American Business—NAFTA Best Practices Jeffrey D. Abbot and Robert T. Moran, Ph.D. Eurodiversity: A Business Guide to Managing Differences George Simons, D.M. Global Strategic Planning: Cultural Perspectives for Profit and Non-Profit Organizations Marios I. Katsioulodes Ph.D. Competing Globally: Mastering Cross-Cultural Management and Negotiations Farid Elashmawi, Ph.D. Succeeding in Business in Eastern and Central Europe—A Guide to Cultures, Markets, and Practices Woodrow H. Sears, Ed.D. and Audrone Tamulionyte-Lentz, M.S. Intercultural Services: A Worldwide Buyer’s Guide and Sourcebook Gary M. Wederspahn, M.A. SIXTH EDITION MANAGING CULTURAL DIFFERENCES GLOBAL LEADERSHIP STRATEGIES ST FOR THE 21 CENTURY 25TH ANNIVERSARY EDITION PHILIP R. HARRIS, PH.D. ROBERT T. MORAN, PH.D. SARAH V. MORAN, M.A. JUDITH SOCCORSY Editorial Coordinator Elsevier Butterworth–Heinemann 200 Wheeler Road, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2004, Philip R. Harris, Robert T. Moran, Sarah V. Moran. All rights reserved. No part of this publication may be reproduced, stored in a...

Words: 229816 - Pages: 920

Free Essay

The Economist

...The Economist 本 PDF 由人人网《经济学人》翻译组提供翻译、整理 新浪微博请关注 http://weibo.com/tett 原文版权归经济学人集团所有 小组地址 http://xiaozu.renren.com/xiaozu/228064 主宰自己人生的秘诀在于求知与冒险,前者让你预见未来,后者让你掌控你所预见的未来。 鸣 组长:钮成拓 组长:胡伟凡 谢 翻译 A 组(一周时事 The world this week 文艺 Books and Arts) 组员:史心语 李雅婷 罗智 朱田牧 沈鱼 唐宇 熊朋迪 姚欣悦 翻译 B 组(财经 Finance & Economics 科技 Science & Technology) 组员:陈默 汤旭武 熊佳 黄文琦 王紫珊 徐莉钦 袁子葳 陈玉梅 许青 汤永永 翻译 C 组(精粹 Briefing 亚洲 Asia) 组长:贺鹏 组员:董董 王英莲 金婧华 杨婕 郑玮 闵昂 董平 苏秋秋 刘畅 杨畅 翻译 D 组(商业 Business 社论 Leaders) 组长:卢爽 组员:程娟 曹宝平 张力 巩子笠 王同同 谢乙德 赵一蓉 管浩波 翻译 E 组(美国 United States 美洲 The Americas) 组长:程蒙 组员:慧子 孔德威 栾子越 裴静 郑恒 胡文玉 王思思 马绍博 李苏 翻译 F 组(中东与非洲 Middle East and Africa 国际 International) 组长:单李扬 组员:樊睿 沈骜 林冰洁 李小千 黄献禾 蔡丽艳 李骏 刘超 翻译 G 组(英国 Britain 欧洲 Europe) 组长:周薇薇 组员:徐文婕 周开文 郭伟华 战培良 郭爽 芳菲 柳杨 王征 李慧彗 郭心睿 李寅 罗丹 张亚玲 校对组 组长:尹茜 组员:李晓敏 任昊 汪楚航 胡心云 张诗玲 张理中 王晴 刘洋 杨舒雅 费凡 ——组员专访 没有赶上这周的小组会议, 但是也得服从组织安排啊。 这周的题目是政治和金融的结合体, 尽管不长, 也让我大费周章。 虽然嘴上说再也不要碰经济类的文章了,但是心里还是有种想要去正视自己软肋的冲动。每次都是拖拖拉拉直到最后,有时 候还要翻译到一点多,厚着脸皮向刘总、组长和校对组的同学们表示深深的歉意。 因为考研,我加入了这个小组,从当初看不得群里一片喧哗,气愤从网横行的河蟹,然后为分组纠结,再到后来认识了 好多朋友,成长的确是一件值得开心的事情。那么多伙伴祝我生日快乐,我一条一条看过去,留下了一个一边笑一边想哭的 扭曲表情。 今天刘总把人人小组对翻译团的超好评发出来了,今后也请各位继续多多努力,我们的目标还很远大呢! C 组-苏秋秋 2011.9.10 《经济学人》中英文对照版 2011 年 9 月 10 日刊 免费订阅地址:http://s8.hk/5vqm -1- 本刊旨在提供学习交流之用,请于下载后 24 小时内删除,我们鼓励购买正版! The Economist 本 周 政 治 要 闻 BY 史 心 语 &罗 智 本 周 商 业 要 闻 BY 唐 宇 &熊 朋 迪 本 PDF 由人人网《经济学人》翻译组提供翻译、整理 财 经 Finance & Economics 红币在国外 新浪微博请关注 http://weibo.com/tett 原文版权归经济学人集团所有 小组地址 http://xiaozu.renren.com/xiaozu/228064 ...

Words: 122696 - Pages: 491

Free Essay

Living History

...___________________________ LIVING HISTORY Hillary Rodham Clinton Simon & Schuster New York • London • Toronto • Sydney • Singapore To my parents, my husband, my daughter and all the good souls around the world whose inspiration, prayers, support and love blessed my heart and sustained me in the years of living history. AUTHOR’S NOTE In 1959, I wrote my autobiography for an assignment in sixth grade. In twenty-nine pages, most half-filled with earnest scrawl, I described my parents, brothers, pets, house, hobbies, school, sports and plans for the future. Forty-two years later, I began writing another memoir, this one about the eight years I spent in the White House living history with Bill Clinton. I quickly realized that I couldn’t explain my life as First Lady without going back to the beginning―how I became the woman I was that first day I walked into the White House on January 20, 1993, to take on a new role and experiences that would test and transform me in unexpected ways. By the time I crossed the threshold of the White House, I had been shaped by my family upbringing, education, religious faith and all that I had learned before―as the daughter of a staunch conservative father and a more liberal mother, a student activist, an advocate for children, a lawyer, Bill’s wife and Chelsea’s mom. For each chapter, there were more ideas I wanted to discuss than space allowed; more people to include than could be named; more places visited than could be described...

Words: 217937 - Pages: 872

Premium Essay

Barron 3500

...6 Build Your Vocabulary ■ ■ ■ ■ The SAT High-Frequency Word List The SAT Hot Prospects Word List The 3,500 Basic Word List Basic Word Parts be facing on the test. First, look over the words on our SAT High-Frequency Word List, which you’ll find on the following pages. Each of these words has appeared (as answer choices or as question words) from eight to forty times on SATs published in the past two decades. Next, look over the words on our Hot Prospects List, which appears immediately after the High-Frequency List. Though these words don’t appear as often as the high-frequency words do, when they do appear, the odds are that they’re key words in questions. As such, they deserve your special attention. Now you’re ready to master the words on the High-Frequency and Hot Prospects Word Lists. First, check off those words you think you know. Then, look up all the words and their definitions in our 3,500 Basic Word List. Pay particular attention to the words you thought you knew. See whether any of them are defined in an unexpected way. If they are, make a special note of them. As you know from the preceding chapters, SAT often stumps students with questions based on unfamiliar meanings of familiar-looking words. Use the flash cards in the back of this book and create others for the words you want to master. Work up memory tricks to help yourself remember them. Try using them on your parents and friends. Not only will going over these high-frequency words reassure you that you...

Words: 92038 - Pages: 369

Free Essay

500 Extraordinary Islands

...500 extraordinary islands G R E E N L A N D Beaufort Sea Baffin Bay vi Da i tra sS t a nm De it Stra rk Hudson Bay Gulf of Alaska Vancouver Portland C A N A D A Calgary Winnipeg Newfoundland Quebec Minneapolis UNITED STATES San Francisco Los Angeles San Diego Phoenix Dallas Ottawa Montreal ChicagoDetroitToronto Boston New York OF AMERICA Philadelphia Washington DC St. Louis Atlanta New Orleans Houston Monterrey NORTH AT L A N T I C OCEAN MEXICO Guadalajara Mexico City Gulf of Mexico Miami Havana CUBA GUATEMALA HONDURAS b e a n Sea EL SALVADOR NICARAGUA Managua BAHAMAS DOMINICAN REPUBLIC JAMAICA San Juan HAITI BELIZE C a r PUERTO RICO ib TRINIDAD & Caracas N TOBAGO A COSTA RICA IA M PANAMA VENEZUELA UYANRINA H GU C U G Medellín A PAC I F I C OCEAN Galapagos Islands COLOMBIA ECUADOR Bogotá Cali S FR EN Belém Recife Lima BR A Z I L PERU La Paz Brasélia Salvador Belo Horizonte Rio de Janeiro ~ Sao Paulo BOLIVIA PARAGUAY CHILE Cordoba Santiago Pôrto Alegre URUGUAY Montevideo Buenos Aires ARGENTINA FALKLAND/MALVINAS ISLANDS South Georgia extraordinary islands 1st Edition 500 By Julie Duchaine, Holly Hughes, Alexis Lipsitz Flippin, and Sylvie Murphy Contents Chapter 1 Beachcomber Islands . . . . . . . . . . . . . . . 1 Aquatic Playgrounds 2 Island Hopping the Turks & Caicos: Barefoot Luxury 12 Life’s a Beach 14 Unvarnished & Unspoiled 21 Sailing...

Words: 249855 - Pages: 1000

Premium Essay

Reading a Novel in 1950-2000

...Reading the Novel in English 1950–2000 i RTNA01 1 13/6/05, 5:28 PM READING THE NOVEL General Editor: Daniel R. Schwarz The aim of this series is to provide practical introductions to reading the novel in both the British and Irish, and the American traditions. Published Reading the Modern British and Irish Novel 1890–1930 Reading the Novel in English 1950–2000 Daniel R. Schwarz Brian W. Shaffer Forthcoming Reading the Eighteenth-Century Novel Paula R. Backscheider Reading the Nineteenth-Century Novel Harry E. Shaw and Alison Case Reading the American Novel 1780–1865 Shirley Samuels Reading the American Novel 1865–1914 G. R. Thompson Reading the Twentieth-Century American Novel James Phelan ii RTNA01 2 13/6/05, 5:28 PM Reading the Novel in English 1950–2000 Brian W. Shaffer iii RTNA01 3 13/6/05, 5:28 PM © 2006 by Brian W. Shaffer BLACKWELL PUBLISHING 350 Main Street, Malden, MA 02148-5020, USA 9600 Garsington Road, Oxford OX4 2DQ, UK 550 Swanston Street, Carlton, Victoria 3053, Australia The right of Brian W. Shaffer to be identified as the Author of this Work has been asserted in accordance with the UK Copyright, Designs, and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs, and...

Words: 123617 - Pages: 495

Premium Essay

Leadership

...Fourth Edition Reframing Organizations Artistry, Choice, and Leadership LEE G. BOLMAN TERRENCE E. DEAL B est- se l l i n g a u t h o rs of LEADING WITH SOUL FOURTH EDITION Reframing Organizations Artistry, Choice, and Leadership Lee G. Bolman • Terrence E. Deal Copyright © 2008 by John Wiley & Sons, Inc. All rights reserved. Published by Jossey-Bass A Wiley Imprint 989 Market Street, San Francisco, CA 94103-1741—www.josseybass.com No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-6468600, or on the Web at www.copyright.com. Requests to the publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-7486011, fax 201-748-6008, or online at www.wiley.com/go/permissions. Credits are on page 528. Readers should be aware that Internet Web sites offered as citations and/or sources for further information may have changed or disappeared between the time this was written and when it is read. Limit of Liability/Disclaimer...

Words: 193447 - Pages: 774