Rowman & Littlefield Publishers / American Foreign Policy Council
Pages: 412
Trim: 6¼ x 9½
978-1-4422-7284-2 • Hardback • October 2016 • $89.00 • (£68.00)
978-1-4422-7285-9 • eBook • October 2016 • $84.50 • (£65.00)
Richard Harrison is the director of Operations and Defense Technology Programs at American Foreign Policy Council. His writings have appeared in Defense News, Jane’s Defence Weekly, USA Today, U.S. News and World Report, and the Washington Times.
Trey Herr is a fellow at the Belfer Center’s Cyber Security Project at the Harvard Kennedy School and a non-resident fellow with New Amerca’s Cybersecurity Initiative.
Acknowledgments
Foreword by the Honorable Richard J. Danzig
Introduction by Trey Herr and Richard M. Harrison
SECTION I: SECURING DATA, DEVICES, AND NETWORKS
1. Understanding Information Assurance, by Eric Ormes and Trey Herr
2. A Path to Collective Security: Information Sharing at the State and Local Level, by David Weinstein
3. Protecting Industrial Control Systems in Critical Infrastructure, by Robert M. Lee
4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy, by Joshua Corman and Beau Woods
5. Bad Code: Exploring Liability in Software Development, by Jane Chong
SECTION II: COMBATING CYBER CRIME
6. Understanding Cyber Crime, by Sasha Romanosky and Trey Herr
7. Disrupting Malware Markets, by Trey Herr and Ryan Ellis
8. The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform, by Paul Ohm
9. Breach Notification Laws: The Policy and Practice, by Sasha Romanosky
10. Cyber Insurance: A Market-Based Approach to Information Assurance, by Robert Morgus
SECTION III: GOVERNING THE SECURITY OF THE INTERNET
11. Understanding Internet Security Governance, by Trey Herr and Heather West
12. A Holistic Approach to the Encryption Debate, by Aaron Brantly
13. Certificate Authorities: Modernizing the Internet’s Chain of Trust, by Adrienne Allen
14. Multistakeholder Approaches to Cybersecurity Challenges, by Allan Friedman and Jonah F. Hill
15. Countering the Proliferation of Malware, by Trey Herr and Paul Rosenzweig
SECTION IV: MILITARY CYBER OPERATIONS
16. Understanding Military Cyber Operations, by Trey Herr and Drew Herrick
17. Government Acquisition and Use of Zero-Day Software Vulnerabilities, by Mailyn Fidler
18. The Joint Cyber Force: Challenges and Opportunities, by Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa
19. The Practical Impact of Classification Regarding Offensive Cyber Operations, by Herbert S. Lin and Taylor Grossman
20. Creating Influence through Information, by Kat Dransfield, Abraham Wagner, and Rand Waltzman
Concluding Remarks by Trey Herr and Richard M. Harrison
Glossary
Index
Contributors
Cyber Insecurity provides a comprehensive understanding to the basic complexities of the cyber world. Its purpose is threefold: first, to the layperson, explaining the critical features of cyberspace and simplifying its essential components that include many key policy issues; second, to the initiated generalist, providing relevant details and references with respect to some of the more technical and policy details; and third, to policy makers and staffers, to serve as a resource for informed work in crafting public policy. . . . I recommend this book for all military members due to its application in military operations but more importantly in our everyday lives.
— Military Review
With careful cultivation, Richard M. Harrison and Trey Herr present a comprehensive manual for policymakers concerned about the growing barrage of cyberattacks but unsure how to address them. Part primer, part briefing, and part policy agenda, Harrison and Herr’s compilation is best described as a series of field reports from the Wild West of cybersecurity law. In addition to bringing together the diverse perspectives of military leaders, legal practitioners, and academics, Harrison and Herr outline four categories for discussing and prioritizing avenues of reform. Section One focuses on Securing Data, Devices and Networks; Section Two on Combating Cyber Crime; section Three on Governing the Security of the Internet; and section Four on Military Cyber Operations. Within these analytical guideposts, each chapter covers a specific topic, from the risks of connectivity in the automobile industry to disrupting malware markets. Wherever each contributors’ recommendations may lead, it is clear Harrison and Herr have taken a significant step in clarifying and guiding serious policy discussion on cybersecurity.
— Harvard Law Review
Much of America seems to view all things cyber as being akin to the black arts... something more to be feared and placated than understood. No more. It's time to step out of the darkness and review the body of history and academic commentary that has been developed. And much of that has been conveniently captured in Cyber Insecurity, a real primer for anyone wanting to better understand the emerging age.
— Michael V. Hayden, Former Director of the National Security Agency, Principal Deputy Director of National Intelligence, and Director of the Central Intelligence Agency
Richard Harrison and Trey Herr have assembled as comprehensive a map as exists to many of the most vexing issues in computer security. Cyber Insecurity deserves to be read by policymakers, industry leaders, academics, and anyone concerned with these increasingly central issues.
— Nate Fick, CEO of Endgame Inc., and NYT bestselling author of ONE BULLET AWAY
We are just beginning to appreciate the limitless social, economic, and personal benefits of living in the hyper-connected, digital world. Cyber Insecurity identifies the risks and threats to the system upon which we become more dependent every day and the means to overcome them. A must read for those living in the digital forevermore!
— Tom Ridge, First Secretary of the Department of Homeland Security and 43rd Governor of Pennsylvania
Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods.