Book description
What people are saying about Inside Cyber Warfare
"The necessary handbook for the 21st century."
--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments
"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."
--Jim Stogdill, CTO, Mission Services Accenture
You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.
Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.
- Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
- Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
- Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
- Find out why many attacks originate from servers in the United States, and who's responsible
- Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
Publisher resources
Table of contents
- Foreword
- Preface
- 1. Assessing the Problem
-
2. The Rise of the Non-State Hacker
- The StopGeorgia.ru Project Forum
- The Russian Information War
-
The Gaza Cyber War Between Israeli and Arabic Hackers During
Operation Cast Lead
- Impact
- Overview of Perpetrators
-
Hackers’ Profiles
- Team Evil
- Cold Zero (aka Cold Z3ro aka Roma Burner)
- Team Hell (aka Team H3ll and Team Heil)
- Agd_Scorp/Peace Crew (aka Agd_Scorp/Terrorist Crew)
- Jurm Team
- C-H Team (aka H-C Team)
- Hackers Pal
- Gaza Hacker Team
- DNS Team
- !TeAm RaBaT-SaLe! (aka Team Rabat-Sale aka Team Rabat-Sala)
- DZ Team
- Ashianeh Security Group
- Nimr al-Iraq (“The Tiger of Iraq”) and XX_Hacker_XX
- Methods of Attack
- Israeli Retaliation
- Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria
- Are Non-State Hackers a Protected Asset?
- 3. The Legal Status of Cyber Warfare
-
4. Responding to International Cyber Attacks As Acts of War
- Introduction by Jeffrey Carr
- Introduction
- The Legal Dilemma
- The Law of War
- Non-State Actors and the Law of War
-
Analyzing Cyber Attacks Under Jus ad Bellum
- Cyber Attacks As Armed Attacks
- Establishing State Responsibility for Cyber Attacks
- The Duty to Prevent Cyber Attacks
- Support from International Conventions
- Support from State Practice
- Support from the General Principles of Law
- Support from Judicial Opinions
- Fully Defining a State’s Duty to Prevent Cyber Attacks
- Sanctuary States and the Practices That Lead to State Responsibility
- The Choice to Use Active Defenses
- Conclusion
- 5. The Intelligence Component to Cyber Warfare
- 6. Non-State Hackers and the Social Web
- 7. Follow the Money
- 8. Organized Crime in Cyberspace
- 9. Investigating Attribution
-
10. Weaponizing Malware
-
A New Threat Landscape
- StopGeorgia.ru Malware Discussions
- Twitter As DDoS Command Post Against Iran
- Social Engineering
- Channel Consolidation
- An Adversary’s Look at LinkedIn
- BIOS-Based Rootkit Attack
- Malware for Hire
- Anti-Virus Software Cannot Protect You
- Targeted Attacks Against Military Brass and Government Executives
-
A New Threat Landscape
- 11. The Role of Cyber in Military Doctrine
- 12. A Cyber Early Warning Model
- 13. Advice for Policy Makers from the Field
- A. Afterword
- Index
- About the Author
- Colophon
- Copyright
Product information
- Title: Inside Cyber Warfare
- Author(s):
- Release date: December 2009
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596802158
You might also like
book
Cyber Warfare
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and …
book
Cyber Minds
Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current …
book
Inside Cyber Warfare, 2nd Edition
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a …
book
The Basics of Cyber Warfare
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical …