did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780596802158

Inside Cyber Warfare : Mapping the Cyber Underworld

by
  • ISBN13:

    9780596802158

  • ISBN10:

    0596802153

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2009-12-23
  • Publisher: Oreilly & Associates Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $39.99 Save up to $4.00
  • Digital
    $35.99
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival Find out why many attacks originate from servers in the United States, and who's responsible Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Author Biography

Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, a columnist for Symantec's Security Focus, and an author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.

Table of Contents

Forewordp. xi
Prefacep. xiii
Assessing the Problemp. 1
The Complex Domain of Cyberspacep. 1
Cyber Warfare in the 20th and 21st Centuriesp. 2
Cyber Espionagep. 4
Cyber Crimep. 5
Future Threatsp. 6
Increasing Awarenessp. 7
Critical Infrastructurep. 8
The Conficker Worm: The Cyber Equivalent of an Extinction Event?p. 12
Africa: The Future Home of the World's Largest Botnet?p. 13
The Way Forwardp. 14
The Rise of the Non-State Hackerp. 15
The StopGeorgia.ru Project Forump. 15
Counter-Surveillance Measures in Placep. 16
The Russian Information Warp. 16
The Foundation for Effective Polities' War on the Net (Day One)p. 17
The Gaza Cyber War Between Israeli and Arabic Hackers During Operation Cast Leadp. 19
Impactp. 19
Overview of Perpetratorsp. 21
Hackers' Profilesp. 22
Methods of Attackp. 26
Israeli Retaliationp. 28
Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeriap. 28
Are Non-State Hackers a Protected Asset?p. 29
The Legal Status of Cyber Warfarep. 31
Nuclear Nonproliferation Treatiesp. 32
The Antarctic Treaty System and Space Lawp. 33
UNCLOSp. 34
MALTp. 34
U.S. Versus Russian Federation: Two Different Approachesp. 34
The Law of Armed Conflictp. 35
Is This an Act of Cyber Warfare?p. 37
South Koreap. 37
Iranp. 37
Tatarstanp. 37
United Statesp. 37
Kyrgyzstanp. 38
Israel and the Palestinian National Authorityp. 38
Zimbabwep. 38
Myanmarp. 39
Cyber: The Chaotic Domainp. 39
Responding to International Cyber Attacks As Acts of Warp. 45
Introduction by Jeffrey Carrp. 45
Introductionp. 45
The Legal Dilemmap. 47
The Road Ahead: A Proposal to Use Active Defensesp. 48
The Law of Warp. 48
General Prohibition on the Use of Forcep. 49
The First Exception: UN Security Council Actionsp. 49
The Second Exception: Self-Defensep. 50
A Subset of Self-Defense: Anticipatory Self-Defensep. 51
An Alternate Basis for Using Active Defenses: Reprisalsp. 52
Non-State Actors and the Law of Warp. 52
Armed Attacks by Non-State Actorsp. 53
Duties Between Statesp. 54
Imputing State Responsibility for Acts by Non-State Actorsp. 55
Cross-Border Operationsp. 56
Analyzing Cyber Attacks Under Jus ad Bellump. 57
Cyber Attacks As Armed Attacksp. 58
Establishing State Responsibility for Cyber Attacksp. 61
The Duty to Prevent Cyber Attacksp. 62
Support from International Conventionsp. 63
Support from State Practicep. 64
Support from the General Principles of Lawp. 66
Support from Judicial Opinionsp. 67
Fully Defining a State's Duty to Prevent Cyber Attacksp. 67
Sanctuary States and the Practices That Lead to State Responsibilityp. 68
The Choice to Use Active Defensesp. 68
Technological Limitations and Jus ad Bellum Analysisp. 69
Jus in Bello Issues Related to the Use of Active Defensesp. 71
Conclusionp. 74
The Intelligence Component to Cyber Warfarep. 77
The Korean DDoS Attacks (July 2009)p. 78
The Botnet Versus the Malwarep. 80
The DPRK's Capabilities in Cyberspacep. 81
One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attackp. 83
Ingushetia Conflict, August 2009p. 85
The Predictive Role of Intelligencep. 86
Non-State Hackers and the Social Webp. 89
Russiap. 89
Chinap. 90
The Middle Eastp. 91
Pakistani Hackers and Facebookp. 92
The Dark Side of Social Networksp. 93
The Cognitive Shieldp. 94
TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequencesp. 97
Automating the Processp. 99
Catching More Spies with Robotsp. 99
Follow the Moneyp. 103
False Identitiesp. 103
Components of a Bulletproof Networkp. 105
ICANNp. 105
The Accredited Registrarp. 106
The Hosting Companyp. 106
The Bulletproof Network of StopGeorgia.rup. 106
StopGeorgia.rup. 106
NAUNET.RUp. 107
SteadyHost.rup. 108
Innovation IT Solutions Corpp. 110
Mirhosting.comp. 112
SoftLayer Technologiesp. 112
SORM-2p. 114
The Kremlin and the Russian Internetp. 115
Naship. 115
The Kremlin Spy for Hire Programp. 117
Sergei Markov, Estonia, and Naship. 118
A Three-Tier Model of Command and Controlp. 119
Organized Crime in Cyberspacep. 121
A Subtle Threatp. 125
Atrivo/Intercagep. 125
ESTDomainsp. 126
McColo: Bulletproof Hosting for the World's Largest Botnetsp. 127
Russian Organized Crime and the Kremlinp. 129
Investigating Attributionp. 131
Using Open Source Internet Datap. 131
Backgroundp. 132
What Is an Autonomous System Network?p. 134
Team Cymru and Its Darknet Reportp. 137
Using WHOISp. 138
Caveats to Using WHOISp. 140
Weaponizing Malwarep. 141
A New Threat Landscapep. 141
StopGeorgia.ru Malware Discussionsp. 141
Twitter As DDoS Command Post Against Iranp. 144
Social Engineeringp. 146
Channel Consolidationp. 148
An Adversary's Look at Linkedlnp. 149
BIOS-Based Rootkit Attackp. 150
Malware for Hirep. 151
Anti-Virus Software Cannot Protect Youp. 151
Targeted Attacks Against Military Brass and Government Executivesp. 152
The Role of Cyber in Military Doctrinep. 161
The Russian Federationp. 161
The Foundation for Effective Politics (FEP)p. 163
"Wars of the Future Will Be Information Wars"p. 165
"RF Military Policy in International Information Security"p. 166
The Art of Misdirectionp. 169
China Military Doctrinep. 171
Anti-Access Strategiesp. 174
The 36 Stratagemsp. 174
U.S. Military Doctrinep. 176
A Cyber Early Warning Modelp. 179
Introduction by Jeffrey Carrp. 179
The Challenge We Facep. 179
Cyber Early Warning Networksp. 180
Building an Analytical Framework for Cyber Early Warningp. 180
Cases Studies of Previous Cyber Attacksp. 183
Lessons Learnedp. 187
Defense Readiness Condition for Cyberspacep. 188
Advice for Policy Makers from the Fieldp. 191
When It Comes to Cyber Warfare: Shoot the Hostagep. 191
The United States Should Use Active Defenses to Defend Its Critical Information Systemsp. 194
Scenarios and Options to Responding to Cyber Attacksp. 196
p. 196
p. 197
p. 198
p. 198
In Summaryp. 198
Whole-of-Nation Cyber Securityp. 199
Afterwordp. 203
Indexp. 207
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program