America's Cyber Future Security and Prosperity in the Information

Total Page:16

File Type:pdf, Size:1020Kb

America's Cyber Future Security and Prosperity in the Information America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age VOLUME II Edited by Kristin M. Lord and Travis Sharp Contributors: Robert E. Kahn, Mike McConnell, Joseph S. Nye, Jr. and Peter Schwartz (co-chairs); Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer Jr., David A. Gross, Jason Healey, James A. Lewis, Kristin M. Lord, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, Christopher M. Schroeder and Travis Sharp Acknowledgments The authors would like to thank the more than 200 people who generously contributed their time and expertise to this proj- ect. We are especially indebted to our co-chairs Bob Kahn, Mike McConnell, Joe Nye and Peter Schwartz for their tremendous support and guidance over the past year. We also thank our contributing authors for producing such insightful essays. We are particularly grateful to the many people who reviewed drafts of the papers included in this volume, including Irv Lachow, James Mulvenon, Charles Dunlap, Eric Rosenbach, Jeff Lord, Tom Gjelten, Greg Rattray, David Asher, Jeff Pryce, Andrew Lewman, Daniel Calingeart, David Gross, Nova Daly and several anonymous reviewers. In addition, we wish to thank the dozens of dedicated professionals in the U.S. government, armed services and private sector who candidly shared their perspectives. We also thank Global Business Network for hosting a workshop in San Francisco in February 2011, as well as the many technologists and other experts who attended. Peter Schwartz, David Babington and Audrey Plonk deserve special recognition for making the workshop a success. We would like to recognize the valuable contributions made by our colleagues at CNAS, particularly Nate Fick, John Nagl, Tom Ricks, Richard Fontaine, Andrew Exum, Christine Parthemore, Brian Burton, Bill Uhlmeyer, Richard Weitz and Will Rogers. Nora Bensahel was a diligent and helpful editor. Liz Fontaine provided her usual high caliber of design expertise. Finally, we offer special thanks to our colleagues Abe Denmark, who played a key role in launching this project and partici- pated in many of our working group sessions, and Jessica Glover and Jackie Koo, who provided scrupulous research and fact checking for this report. Readers should note that the views expressed in each essay of Volumes I and II belong to the author(s) alone. They do not necessarily reflect the views of the editors, co-chairs or any of the other contributing authors, nor do they necessarily reflect the views of the authors’ employers or any other organization. A Note about Funding This report was made possible, in part, through the generous support of the Markle Foundation. The opinions expressed in the report are those of the authors and do not necessarily reflect the views of the Markle Foundation. Some organizations and companies that are mentioned in this report or have vested interests related to cyber security sup- port CNAS financially. CNAS retains sole editorial control over its projects and maintains a broad and diverse group of more than one hundred funders including foundations, government agencies, corporations and private individuals. A complete list of CNAS’ financial supporters can be found at http://www.cnas.org/support/our-supporters. Cover Image (ISTOCK) JUNE 2011 America’s Cyber Future Security and Prosperity in the Information Age VOLUME II Edited by Kristin M. Lord and Travis Sharp Contributors: Robert E. Kahn, Mike McConnell, Joseph S. Nye, Jr. and Peter Schwartz (co- chairs); Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer Jr., David A. Gross, Jason Healey, James A. Lewis, Kristin M. Lord, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, Christopher M. Schroeder and Travis Sharp America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age About the Contributors (in order of appearance) Kristin M. Lord is Vice President and Director of Studies at the Center for a New American Security. Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral. com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the 2 | Center for a New American Security’s board of directors. Table of Contents VOLUME I America’s Cyber Future: Security and Prosperity in the Information Age By Kristin M. Lord and Travis Sharp I. Executive Summary 7 II. Introduction 11 III. U.S. National Interests in Cyberspace 12 IV. The Nature of Cyber Threats 20 V. Current U.S. Government Efforts to Promote Cyber Security 31 VI. Policy Recommendations 37 VII. Conclusion 51 VOLUME II Chapter I: Power and National Security in Cyberspace 5 By Joseph S. Nye, Jr. Chapter II: Cyber Insecurities: The 21st Century Threatscape 25 By Mike McConnell Chapter III: Separating Threat from the Hype: 41 What Washington Needs to Know about Cyber Security By Gary McGraw and Nathaniel Fick Chapter IV: Cyberwar and Cyber Warfare 55 By Thomas G. Mahnken Chapter V: Non-State Actors and Cyber Conflict 65 By Gregory J. Rattray and Jason Healey Chapter VI: Cultivating International Cyber Norms 87 By Martha Finnemore Chapter VII: Cyber Security Governance: Existing Structures, 103 International Approaches and the Private Sector By David A. Gross, Nova J. Daly, M. Ethan Lucarelli and Roger H. Miksad Chapter VIII: Why Privacy and Cyber Security Clash 123 By James A. Lewis Chapter IX: Internet Freedom and Its Discontents: 143 Navigating the Tensions with Cyber Security By Richard Fontaine and Will Rogers Chapter X: The Unprecedented Economic Risks of Network Insecurity 165 By Christopher M. Schroeder Chapter XI: How Government Can Access Innovative Technology 183 By Daniel E. Geer, Jr. Chapter XII: The Role of Architecture in Internet Defense 203 By Robert E. Kahn Chapter XIII: Scenarios for the Future of Cyber Security 217 By Peter Schwartz | 3 America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age quote. — Author CHAPTER I: Power and National securitY in CYberspace By Joseph S. Nye, Jr. America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age quote. — Author POWER AND National SECURITY The cyber domain is a new and a volatile man- IN CYberspace made environment.* The characteristics of cyberspace often reduce power differentials among actors, and thus provide a good example of the diffusion of power that typifies global politics in this century. The largest powers are unlikely to be able to dominate cyberspace as much as they have dominated other domains like sea or air. While powerful nations have greater resources, they also have greater vulnerabilities. So, at this stage in the development of the technology, offense dominates defense in cyberspace. That in turn leads to new and complex dimensions in national security policy. The community of national security analysts is only beginning to grapple with the implications of the new technologies and what they mean for attack, deterrence, defense, negotiation, coop- eration and non-state actors. In the words of the JASON advisory panel of defense scientists (an independent group of scientists that advises the By Joseph S. Nye, Jr. government on technological and scientific issues), “People built all the pieces,” but “the cyberuniverse is complex well beyond anyone’s understanding and exhibits behavior that no one predicted, and sometimes can’t even be explained well.” The com- plexity goes beyond that of natural systems because it also involves human strategic interactions.
Recommended publications
  • Generation Kill and the New Screen Combat Magdalena Yüksel and Colleen Kennedy-Karpat
    15 Generation Kill and the New Screen Combat Magdalena Yüksel and Colleen Kennedy-Karpat No one could accuse the American cultural industries of giving the Iraq War the silent treatment. Between the 24-hour news cycle and fictionalized enter- tainment, war narratives have played a significant and evolving role in the media landscape since the declaration of war in 2003. Iraq War films, on the whole, have failed to impress audiences and critics, with notable exceptions like Kathryn Bigelow’s The Hurt Locker (2008), which won the Oscar for Best Picture, and her follow-up Zero Dark Thirty (2012), which tripled its budget in worldwide box office intake.1 Television, however, has fared better as a vehicle for profitable, war-inspired entertainment, which is perhaps best exemplified by the nine seasons of Fox’s 24 (2001–2010). Situated squarely between these two formats lies the television miniseries, combining seriality with the closed narrative of feature filmmaking to bring to the small screen— and, probably more significantly, to the DVD market—a time-limited story that cultivates a broader and deeper narrative development than a single film, yet maintains a coherent thematic and creative agenda. As a pioneer in both the miniseries format and the more nebulous category of quality television, HBO has taken fresh approaches to representing combat as it unfolds in the twenty-first century.2 These innovations build on yet also depart from the precedent set by Band of Brothers (2001), Steven Spielberg’s WWII project that established HBO’s interest in war-themed miniseries, and the subsequent companion project, The Pacific (2010).3 Stylistically, both Band of Brothers and The Pacific depict WWII combat in ways that recall Spielberg’s blockbuster Saving Private Ryan (1998).
    [Show full text]
  • A Study of Android Application Security
    A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University enck, octeau, mcdaniel, swarat @cse.psu.edu { } Abstract ingly desire it, markets are not in a position to provide security in more than a superficial way [30]. The lack of The fluidity of application markets complicate smart- a common definition for security and the volume of ap- phone security. Although recent efforts have shed light plications ensures that some malicious, questionable, and on particular security issues, there remains little insight vulnerable applications will find their way to market. into broader security characteristics of smartphone ap- In this paper, we broadly characterize the security of plications. This paper seeks to better understand smart- applications in the Android Market. In contrast to past phone application security by studying 1,100 popular studies with narrower foci, e.g., [14, 12], we consider a free Android applications. We introduce the ded decom- breadth of concerns including both dangerous functional- piler, which recovers Android application source code ity and vulnerabilities, and apply a wide range of analysis directly from its installation image. We design and exe- techniques. In this, we make two primary contributions: cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. We design and implement a Dalvik decompilier, • Our analysis uncovered pervasive use/misuse of person- ded. ded recovers an application’s Java source al/phone identifiers, and deep penetration of advertising solely from its installation image by inferring lost and analytics networks.
    [Show full text]
  • Opentext Product Security Assurance Program
    The Information Company ™ Product Security Assurance Program Contents Objective 03 Scope 03 Sources 03 Introduction 03 Concept and design 04 Development 05 Testing and quality assurance 07 Maintain and support 09 Partnership and responsibility 10 Privavy and Security Policy 11 Product Security Assurance Program 2/11 Objective The goals of the OpenText Product Security Assurance Program (PSAP) are to help ensure that all products, solutions, and services are designed, developed, and maintained with security in mind, and to provide OpenText customers with the assurance that their important assets and information are protected at all times. This document provides a general, public overview of the key aspects and components of the PSAP program. Scope The scope of the PSAP includes all software solutions designed and developed by OpenText and its subsidiaries. All OpenText employees are responsible to uphold and participate in this program. Sources The source of this overview document is the PSAP Standard Operating Procedure (SOP). This SOP is highly confidential in nature, for internal OpenText consumption only. This overview document represents the aspects that are able to be shared with OpenText customers and partners. Introduction OpenText is committed to the confidentiality, integrity, and availability of its customer information. OpenText believes that the foundation of a highly secure system is that the security is built in to the software from the initial stages of its concept, design, development, deployment, and beyond. In this respect,
    [Show full text]
  • The OWASP Application Security Program Quick Start Guide
    Quick Start Guide The OWASP Application Security Program Quick Start Guide Five Days to Setting Up an Application Security Program Quickstart Guide About this Guide This guide is intended to be a short, straightforward introductory guide to standing-up or improving an Application Security Program1. The intended goal of the AppSec program is to implement measures throughout the code’s life- cycle to prevent gaps in the application security policy or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application. The application security program should effectively manage the security of its application systems, protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability. A fundamental component of this improved application security management is the ability to demonstrate acceptable levels of risk based on defined KPIs, including but limited to: 1. The number of vulnerabilities present in an application 2. The time to fix vulnerabilities 3. The remediation rate of vulnerabilities 4. The time vulnerabilities remain open The application security program deliverables include a holistic view of the state of security for each application, identifying the risks associated with the application and the countermeasures implemented to mitigate those risks, explaining how security is implemented, planning for system downtimes and emergencies, and providing a formal plan to improve the security in one or more of these areas. Audience The intended audience of this document is anyone from security engineers, developers, program managers, senior managers or a senior executive. This guide should be considered the start of a comprehensive approach, it is intended to give the basic questions and answers that should be asked by those who are in charge of the application security program in your organization, this includes those responsible for managing the risk of the entire organization.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Cybersecurity in a Digital Era.Pdf
    Digital McKinsey and Global Risk Practice Cybersecurity in a Digital Era June 2020 Introduction Even before the advent of a global pandemic, executive teams faced a challenging and dynamic environ- ment as they sought to protect their institutions from cyberattack, without degrading their ability to innovate and extract value from technology investments. CISOs and their partners in business and IT functions have had to think through how to protect increasingly valuable digital assets, how to assess threats related to an increasingly fraught geopolitical environment, how to meet increasingly stringent customer and regulatory expectations and how to navigate disruptions to existing cybersecurity models as companies adopt agile development and cloud computing. We believe there are five areas for CIOs, CISOs, CROs and other business leaders to address in particular: 1. Get a strategy in place that will activate the organization. Even more than in the past cybersecurity is a business issue – and cybersecurity effectiveness means action not only from the CISO organiza- tion, but also from application development, infrastructure, product development, customer care, finance, human resources, procurement and risk. A successful cybersecurity strategy supports the business, highlights the actions required from across the enterprise – and perhaps most importantly captures the imagination of the executive in how it can manage risk and also enable business innovation. 2. Create granular, analytic risk management capabilities. There will always be more vulnerabilities to address and more protections you can consider than you will have capacity to implement. Even companies with large and increasing cybersecurity budgets face constraints in how much change the organization can absorb.
    [Show full text]
  • Robert and Renée Belfer Center for Science and International Affairs Annual Report 2020
    Robert and Renée Belfer Center for Science and International Affairs Annual Report 2020 ANNUAL REPORT 2020 A The Robert and Renée Belfer CONTENTS Center for Science and International Affairs CORE From the Director ..........................................................................1 Annual Report Center-Wide Activities .................................................................8 2020 Publications & Communications ...........................................12 DIRECTOR PROJECT UPDATES Ash Carter [email protected] Arctic Initiative .............................................................................18 CO-DIRECTOR Avoiding Great Power War .....................................................19 Eric Rosenbach [email protected] Cyber Project ................................................................................20 Defending Digital Democracy................................................21 EXECUTIVE DIRECTOR Aditi Kumar Defense Project ...........................................................................22 [email protected] Economic Diplomacy Initiative ..............................................23 DIRECTOR OF GLOBAL COMMUNICATIONS AND STRATEGY Environment and Natural Resources ..................................24 Josh Burek [email protected] Europe and the Transatlantic Relationship .......................25 Future of Diplomacy ..................................................................26 Geopolitics of Energy ................................................................27
    [Show full text]
  • Digital Finance and Data Security
    Digital Finance and Data Security How Private and Secure Is Data Used in Digital Finance? September 2018 AUTHOR Patrick Traynor Acknowledgements Introduction 1 We gratefully acknowledge the Data Privacy and Security Issues in Online Lending 1 generous support provided by the Digital Finance Providers Evaluated 3 Center for Financial Inclusion at Accion, without which this work 1. Privacy Analysis 5 would not have been possible. We Methodology 5 would particularly like to thank Sonja Results 7 Kelly, Director of Research, and Pablo Antón Díaz, Research Manager, for not Conclusions 10 only helping us to work productively with security stakeholders around 2. Security Analysis 11 the world, but also for their tireless Methodology 11 efforts to ensure that these issues are Results 17 prioritized and addressed. Conclusions 25 We also wish to thank Jasmine Bowers, Kevin Butler, and Imani 26 Sherman of the University of Florida, 3. Terms of Service Analysis all of whom made significant contributions to the successful 4. Conclusions and Recommendations 28 completion of this work. Annex A Word Count vs. Average Reading Grade Level of Privacy Policies 30 Annex B Digital Lenders Evaluated and Analyses Performed 32 Notes 33 Introduction Data Privacy and Security Issues Amounts and loan maturities vary from very in Online Lending short-term “nano” loans of a few dollars to Mobile phones and networks are transforming medium-term small business loans of a few the world of finance, creating opportunities hundred or some thousands of dollars. Some for widespread financial inclusion, especially companies have grown to substantial — even among neglected regions and groups.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • What Killed Australian Cinema & Why Is the Bloody Corpse Still Moving?
    What Killed Australian Cinema & Why is the Bloody Corpse Still Moving? A Thesis Submitted By Jacob Zvi for the Degree of Doctor of Philosophy at the Faculty of Health, Arts & Design, Swinburne University of Technology, Melbourne © Jacob Zvi 2019 Swinburne University of Technology All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. II Abstract In 2004, annual Australian viewership of Australian cinema, regularly averaging below 5%, reached an all-time low of 1.3%. Considering Australia ranks among the top nations in both screens and cinema attendance per capita, and that Australians’ biggest cultural consumption is screen products and multi-media equipment, suggests that Australians love cinema, but refrain from watching their own. Why? During its golden period, 1970-1988, Australian cinema was operating under combined private and government investment, and responsible for critical and commercial successes. However, over the past thirty years, 1988-2018, due to the detrimental role of government film agencies played in binding Australian cinema to government funding, Australian films are perceived as under-developed, low budget, and depressing. Out of hundreds of films produced, and investment of billions of dollars, only a dozen managed to recoup their budget. The thesis demonstrates how ‘Australian national cinema’ discourse helped funding bodies consolidate their power. Australian filmmaking is defined by three ongoing and unresolved frictions: one external and two internal. Friction I debates Australian cinema vs. Australian audience, rejecting Australian cinema’s output, resulting in Frictions II and III, which respectively debate two industry questions: what content is produced? arthouse vs.
    [Show full text]
  • Game Hacking 101
    6627ch02.qxd_lb 6/22/07 7:31 AM Page 19 2 Game Hacking 101 oftware piracy has long been a problem in the computer games busi- Sness—ever since games moved from stand-alone machines in the 1970s to PCs in the 1980s. Game makers, justifiably, have gone to great lengths to thwart piracy. In the past, game makers added various countermeasures to their software to make games harder to crack. The main purpose was to prevent rampant copying so that people who wanted to play the game had to buy it. In the end, these games were always cracked—but in some cases, the countermeasures delayed the release of a cracked version by days or even weeks. This delay earned real revenue for the game companies because delaying a crack for even a week translated into hundreds of thousands of dollars. Antipiracy countermeasures made some economic sense in the over-the- counter paradigm, in which a gamer purchased a copy of the game from a retailer and installed the copy locally on his or her PC. But things have changed. Many modern games have moved online, and with the advent of game consoles connected to the Internet, this trend is likely to accelerate.1 That means companies now have two revenue sources to protect: the 1. The hugely popular Nintendo Wii, which debuted in late 2006, will certainly accelerate this trend. 19 6627ch02.qxd_lb 6/22/07 7:31 AM Page 20 20 Chapter 2 Game Hacking 101 original game price in the retail channel, and a monthly subscription revenue stream for online access.
    [Show full text]
  • Marine Lt. Nathaniel Fick Leads a Band of Brothers in His Memoir of The
    OCTOBER 22 2005 SAN DIEGO DOWNTOWN NEWS BOOKS IRAQ Young Men and Fire Marine Lt. Nathaniel Fick leads a band of brothers in his memoir of the Iraq War By JASON WATKINS sion of Iraq, breaching the south- DOWNTOWN NEWS ern border with Kuwait sometime in the morning hours of March 21, he most striking evi- 2003, then crossing the Euphrates dence of Nathaniel Fick’s and Tigris rivers and eventually abilities as a world-class arriving in Baghdad just as the military mind comes not statue of Saddam was being top- from his Dartmouth edu- pled by U.S. troops. Tcation nor his reverence for Marine Their journey was chronicled in Corps history nor even the bulk of Evan Wright’s acclaimed book, the decisions he made in battle, but “Generation Kill,” and in his three- rather from the single fact that he part series that appeared in Rolling returned home from war with the Stone, but Wright’s account is same number of men he left with. strictly that of an embedded Fick makes only passing mention reporter while Fick’s was written of this in his newly published book, by the man who was making the “One Bullet Away: The Making of a decisions. (In a sense, Fick’s telling Marine Officer,” in which he of the same story proves how dif- recounts his journey from Ivy ferently an event is viewed by each League upperclassman through observer.) Officer Candidate School to the bat- One of the book’s many virtues is tlefields of Afghanistan and Iraq.
    [Show full text]