did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780764537103

Secrets of Computer Espionage : Tactics and Countermeasures

by
  • ISBN13:

    9780764537103

  • ISBN10:

    0764537105

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2003-06-20
  • Publisher: WILEY
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $40.00 Save up to $1.20
  • Buy New
    $38.80
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government * Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals * Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes * Companion Web site contains links to security tools and useful security information resources

Author Biography

Joel McNamara is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.

Table of Contents

Acknowledgments vii
Introduction xvii
Chapter 1 Spies 1(24)
Getting to Know Spies
1(1)
What Spies Are After and Who They Are
2(16)
Business Spies-Economic Espionage
4(2)
Bosses-Employee Monitoring
6(1)
Cops-Law Enforcement Investigations
7(2)
Private Eyes and Consultants-Private Investigations
9(2)
Spooks-Government-Sponsored Intelligence Gathering
11(3)
Criminals-Ill-Gotten Gains
14(1)
Whistled Owers-For the Public Good
15(1)
Friends and Family-with Friends like These
16(2)
Determining Your Level of Paranoia
18(2)
Risk Analysis 101
20(4)
Five-Step Risk Analysis
21(3)
Summary
24(1)
Chapter 2 Spying and the Law 25(22)
Laws that Relate to Spying
25(10)
Omnibus Crime Control and Safe Streets Act of 1968 (Title III-Wiretap Act)
26(1)
Foreign Intelligence Surveillance Act of 1978
27(2)
Electronic Communications Privacy Act of 1986
29(3)
Computer Fraud and Abuse Act of 1986
32(2)
Economic Espionage Act of 1996
34(1)
State Laws
34(1)
Implications of the USA Patriot Act of 2001
35(4)
Wiretap and Stored Communications Access Acts
36(1)
Foreign Intelligence Surveillance Act
36(1)
Computer Fraud and Abuse Act
37(2)
Other Provisions
39(1)
State Laws
39(1)
The Realities of Enforcement
39(2)
Civil versus Criminal Court
41(1)
Bosses and Employees-Legal Spying
42(1)
Legal Issues with Family Members
43(2)
Summary
45(2)
Chapter 3 Black Bag Jobs 47(20)
A Look Inside the Black Bag
47(3)
Physical and Network Black Bag Jobs
48(1)
Planned and Opportunistic Black Bag Jobs
49(1)
Spy Tactics
50(5)
Spy Games
50(1)
Inside a Government Black Bag Job
51(4)
Exploiting the Vulnerabilities
55(7)
Researching and Planning the Operation
55(2)
Gaining Entry
57(3)
Documenting the Scene
60(2)
Countermeasures
62(4)
Physical Security
63(1)
Security Policies
64(2)
Summary
66(1)
Chapter 4 Breaching the System 67(28)
Spy Tactics
67(22)
Exploiting the Vulnerabilities
68(15)
System-Breaching Tools
83(6)
Countermeasures
89(5)
Security Settings
89(4)
Effective Passwords
93(1)
Encryption
93(1)
Summary
94(1)
Chapter 5 Searching for Evidence 95(40)
Legal Spying
95(7)
How Computer Cops Work
95(3)
Seizure
98(2)
Forensic Duplication
100(1)
Examination
101(1)
Spy Tactics
102(20)
Exploiting the Vulnerabilities
102(15)
Evidence-Gathering Tools
117(5)
Countermeasures
122(11)
Encryption
122(5)
Steganography
127(3)
File Wipers
130(3)
Evidence-Eliminating Software
133(1)
Summary
133(2)
Chapter 6 Unprotecting Data 135(28)
Spy Tactics
135(18)
Exploiting Vulnerabilities
136(10)
Cracking Tools
146(7)
Countermeasures
153(8)
Strong Encryption
153(1)
Password Policies
154(2)
Password Lists
156(1)
Password Alternatives
157(4)
Summary
161(2)
Chapter 7 Copying Data 163(14)
Spy Tactics
163(2)
Use Available Resources
164(1)
Use Compression Tools
164(1)
Consider Other Data
164(1)
Understand What's Involved in Copying Data
164(1)
Storage Media to Target
165(9)
Floppy Disks
166(1)
CD-R/CD-RWs
166(2)
DVDs
168(1)
ZIP Disks
169(1)
Memory Storage Devices
169(2)
Hard Drives
171(3)
Tape Backup Systems
174(1)
Alternate Methods of Copying Data
174(2)
Transferring Data Over a Network
174(1)
Digital Cameras
175(1)
Summary
176(1)
Chapter 8 Snooping with Keyloggers 177(28)
An Introduction to Keyloggers
177(1)
Spy Tactics
178(13)
Exploiting the Vulnerabilities
179(7)
Keylogger Tools
186(5)
Countermeasures
191(11)
Viewing Installed Programs
191(1)
Examining Startup Programs
191(2)
Examining Running Processes
193(2)
Monitoring File Writes
195(1)
Removing Visual Basic Runtimes
196(1)
Searching for Strings
196(1)
Using Personal Firewalls
196(1)
Using File Integrity and Registry Checkers
196(1)
Using Keylogger-Detection Software
197(1)
Using Sniffers
198(1)
Detecting Hardware Keyloggers
199(1)
Exploiting Keylogger Passwords
200(1)
Using Linux
200(1)
Watching for Unusual Crashes
201(1)
Removing Keyloggers
202(1)
Summary
202(3)
Chapter 9 Spying with Trojan Horses 205(22)
Spy Tactics
205(16)
Exploiting the Vulnerabilities
206(10)
Trojan Horse Tools
216(5)
Countermeasures
221(4)
Network Defenses
221(1)
Using Registry Monitors and File-Integrity Checkers
222(1)
Using Antivirus Software
223(1)
Using Trojan Detection Software
223(1)
Removing Trojan Horses
224(1)
Using Non-Microsoft Software
224(1)
Summary
225(2)
Chapter 10 Network Eavesdropping 227(32)
Introduction to Network Spying
227(5)
Types of Network Attacks
227(1)
Network Attack Origin Points
228(1)
Information Compromised During Network Attacks
229(1)
Broadband Risks
230(2)
Spy Tactics
232(14)
Exploiting the Vulnerabilities
232(10)
Network-Information and Eavesdropping Tools
242(4)
Countermeasures
246(11)
Applying Operating System and Application Updates
246(1)
Using Intrusion Detection Systems
246(1)
Using Firewalls
247(3)
Running a Virtual Private Network
250(1)
Monitoring Network Connections
251(1)
Using Sniffers
251(1)
Using Port and Vulnerability Scanners
252(1)
Encrypting Your E-Mail
253(1)
Encrypting Your Instant Messages
253(1)
Using Secure Protocols
254(1)
Don't Trust "Strange" Computers and Networks
254(1)
Hardening Windows File Sharing
254(1)
Using Secure Web E-Mail
255(1)
Using Anonymous Remailers
255(1)
Using Web Proxies
256(1)
Summary
257(2)
Chapter 11 802.1 lb Wireless Network Eavesdropping 259(30)
An Introduction to Wireless Networks
259(1)
History of the Wireless Network
259(1)
Spy Tactics
260(24)
Exploiting the Vulnerabilities
261(5)
Wireless-Network-Eavesdropping Tools
266(18)
Countermeasures
284(4)
Audit Your Own Network
284(1)
Position Antennas Correctly
284(1)
Detect Wireless Discovery Tools
285(1)
Fool Discovery Tools
285(1)
Enable WEP
286(1)
Change WEP Keys Regularly
286(1)
Authenticate MAC Addresses
286(1)
Rename the SSID
286(1)
Disable Broadcast SSID
287(1)
Change the Default AP Password
287(1)
Use Static IP Addresses versus DHCP
287(1)
Locate APs Outside Firewalls
287(1)
Use VPNs
287(1)
Don't Rely on Distance as Security
288(1)
Turn Off the AP
288(1)
Summary
288(1)
Chapter 12 Spying on Electronic Devices 289(24)
Office Devices
289(5)
Fax Machines
289(3)
Shredders
292(2)
Communication Devices
294(13)
Telephones
294(5)
Cellular Phones
299(4)
Answering Machines and Voice-Mail
303(2)
Pagers
305(2)
Consumer Electronics
307(4)
PDAs
307(2)
Digital Cameras
309(1)
GPS Units
309(1)
Video Game Consoles
310(1)
MP3 Players
311(1)
Television Digital Recorders
311(1)
Summary
311(2)
Chapter 13 Advanced Computer Espionage 313(28)
TEMPEST-Electromagnetic Eavesdropping
313(6)
Emanation Monitoring: Fact or Fiction?
314(4)
EMSEC Countermeasures
318(1)
Optical TEMPEST-LEDs and Reflected Light
319(1)
HIJACK and NONSTOP
319(1)
ECHELON-Global Surveillance
320(5)
How ECHELON Works
321(1)
ECHELON Controversy and Countermeasures
322(3)
Carnivore/DCS-1000
325(2)
An Overview of Carnivore
325(1)
Carnivore Controversy and Countermeasures
326(1)
Magic Lantern
327(2)
Modified Applications and Operating System Components
329(3)
Intelligence-Gathering Viruses and Worms
332(4)
Viruses and Worms
333(3)
Countermeasures
336(1)
Surveillance Cameras
336(4)
Webcams
337(2)
Commercial Surveillance Cameras
339(1)
Summary
340(1)
Appendix A: What's in the Web Site 341(2)
Index 343

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program