When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare - without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You'll discover how sophisticated…mehr
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare - without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.
Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.
Inhaltsangabe
Foreword Preface How This Book Came to Be Conventions Used in This Book Attributions and Permissions How to Contact Us Safari® Books Online Acknowledgments Chapter 1: Assessing the Problem 1.1 The Complex Domain of Cyberspace 1.2 Cyber Crime 1.3 Future Threats 1.4 The Conficker Worm: The Cyber Equivalent of an Extinction Event? 1.5 Africa: The Future Home of the World's Largest Botnet? 1.6 The Way Forward Chapter 2: The Rise of the Nonstate Hacker 2.1 The StopGeorgia.ru Project Forum 2.2 The Russian Information War 2.3 The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead 2.4 Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria 2.5 Are Nonstate Hackers a Protected Asset? Chapter 3: The Legal Status of Cyber Warfare 3.1 Nuclear Nonproliferation Treaties 3.2 The Antarctic Treaty System and Space Law 3.3 UNCLOS 3.4 MLAT 3.5 The Law of Armed Conflict 3.6 Is This an Act of Cyber Warfare? 3.7 Cyber: The Chaotic Domain Chapter 4: Responding to International Cyber Attacks as Acts of War 4.1 The Legal Dilemma 4.2 The Law of War 4.3 Nonstate Actors and the Law of War 4.4 Analyzing Cyber Attacks under Jus ad Bellum 4.5 The Choice to Use Active Defenses 4.6 Conclusion Chapter 5: The Intelligence Component to Cyber Warfare 5.1 The Korean DDoS Attacks (July 2009) 5.2 One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack 5.3 Ingushetia Conflict, August 2009 5.4 The Predictive Role of Intelligence Chapter 6: Nonstate Hackers and the Social Web 6.1 Russia 6.2 China 6.3 The Middle East 6.4 Pakistani Hackers and Facebook 6.5 The Dark Side of Social Networks 6.6 TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences 6.7 Automating the Process Chapter 7: Follow the Money 7.1 False Identities 7.2 Components of a Bulletproof Network 7.3 The Bulletproof Network of StopGeorgia.ru 7.4 SORM-2 7.5 The Kremlin and the Russian Internet 7.6 A Three-Tier Model of Command and Control Chapter 8: Organized Crime in Cyberspace 8.1 A Subtle Threat 8.2 Russian Organized Crime and the Kremlin Chapter 9: Investigating Attribution 9.1 Using Open Source Internet Data 9.2 Team Cymru and Its Darknet Report 9.3 Using WHOIS Chapter 10: Weaponizing Malware 10.1 A New Threat Landscape Chapter 11: The Role of Cyber in Military Doctrine 11.1 The Russian Federation 11.2 China Military Doctrine Chapter 12: A Cyber Early Warning Model 12.1 The Challenge We Face Chapter 13: Advice for Policymakers from the Field 13.1 When It Comes to Cyber Warfare: Shoot the Hostage 13.2 The United States Should Use Active Defenses to Defend Its Critical Information Systems 13.3 Scenarios and Options to Responding to Cyber Attacks 13.4 In Summary 13.5 Whole-of-Nation Cyber Security Chapter 14: Conducting Operations in the Cyber-Space-Time Continuum 14.1 Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement 14.2 Social Networks: The Geopolitical Strategy of Russian Investment in Social Media 14.3 Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec Chapter 15: The Russian Federation: Information Warfare Framework 15.1 Russia: The Information Security State 15.2 Russian Ministry of Defense 15.3 Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO) 15.4 Russian Federation Ministry of Communications and Mass Communications (Minsvyaz) 15.5 Further Research Areas Chapter 16: Cyber Warfare Capabilities by Nation-State 16.1 Australia 16.2 Brazil 16.3 Canada 16.4 Czech Republic 16.5 Democratic People's Republic of Korea 16.6 Estonia 16.7 European Union 16.8 France 16.9 Germany 16.10 India 16.11 Iran 16.12 Israel 16.13 Italy 16.14 Kenya 16.15 Myanmar 16.16 NATO 16.17 Netherlands 16.18 Nigeria 16.19 Pakistan 16.20 People's Republic of China 16.21 Poland 16.22 Republic of Korea 16.23 Russian Federation 16.24 Singapore 16.25 South Africa 16.26 Sweden 16.27 Taiwan (Republic of China) 16.28 Turkey 16.29 United Kingdom Chapter 17: US Department of Defense Cyber Command and Organizational Structure 17.1 Summary 17.2 Organization Chapter 18: Active Defense for Cyber: A Legal Framework for Covert Countermeasures 18.1 Covert Action 18.2 Cyber Active Defense Under International Law 18.3 Cyber Active Defenses as Covert Action Under International Law 18.4 Cyber Attacks Under International Law: Nonstate Actors Colophon
Foreword Preface How This Book Came to Be Conventions Used in This Book Attributions and Permissions How to Contact Us Safari® Books Online Acknowledgments Chapter 1: Assessing the Problem 1.1 The Complex Domain of Cyberspace 1.2 Cyber Crime 1.3 Future Threats 1.4 The Conficker Worm: The Cyber Equivalent of an Extinction Event? 1.5 Africa: The Future Home of the World's Largest Botnet? 1.6 The Way Forward Chapter 2: The Rise of the Nonstate Hacker 2.1 The StopGeorgia.ru Project Forum 2.2 The Russian Information War 2.3 The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead 2.4 Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria 2.5 Are Nonstate Hackers a Protected Asset? Chapter 3: The Legal Status of Cyber Warfare 3.1 Nuclear Nonproliferation Treaties 3.2 The Antarctic Treaty System and Space Law 3.3 UNCLOS 3.4 MLAT 3.5 The Law of Armed Conflict 3.6 Is This an Act of Cyber Warfare? 3.7 Cyber: The Chaotic Domain Chapter 4: Responding to International Cyber Attacks as Acts of War 4.1 The Legal Dilemma 4.2 The Law of War 4.3 Nonstate Actors and the Law of War 4.4 Analyzing Cyber Attacks under Jus ad Bellum 4.5 The Choice to Use Active Defenses 4.6 Conclusion Chapter 5: The Intelligence Component to Cyber Warfare 5.1 The Korean DDoS Attacks (July 2009) 5.2 One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack 5.3 Ingushetia Conflict, August 2009 5.4 The Predictive Role of Intelligence Chapter 6: Nonstate Hackers and the Social Web 6.1 Russia 6.2 China 6.3 The Middle East 6.4 Pakistani Hackers and Facebook 6.5 The Dark Side of Social Networks 6.6 TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences 6.7 Automating the Process Chapter 7: Follow the Money 7.1 False Identities 7.2 Components of a Bulletproof Network 7.3 The Bulletproof Network of StopGeorgia.ru 7.4 SORM-2 7.5 The Kremlin and the Russian Internet 7.6 A Three-Tier Model of Command and Control Chapter 8: Organized Crime in Cyberspace 8.1 A Subtle Threat 8.2 Russian Organized Crime and the Kremlin Chapter 9: Investigating Attribution 9.1 Using Open Source Internet Data 9.2 Team Cymru and Its Darknet Report 9.3 Using WHOIS Chapter 10: Weaponizing Malware 10.1 A New Threat Landscape Chapter 11: The Role of Cyber in Military Doctrine 11.1 The Russian Federation 11.2 China Military Doctrine Chapter 12: A Cyber Early Warning Model 12.1 The Challenge We Face Chapter 13: Advice for Policymakers from the Field 13.1 When It Comes to Cyber Warfare: Shoot the Hostage 13.2 The United States Should Use Active Defenses to Defend Its Critical Information Systems 13.3 Scenarios and Options to Responding to Cyber Attacks 13.4 In Summary 13.5 Whole-of-Nation Cyber Security Chapter 14: Conducting Operations in the Cyber-Space-Time Continuum 14.1 Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement 14.2 Social Networks: The Geopolitical Strategy of Russian Investment in Social Media 14.3 Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec Chapter 15: The Russian Federation: Information Warfare Framework 15.1 Russia: The Information Security State 15.2 Russian Ministry of Defense 15.3 Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO) 15.4 Russian Federation Ministry of Communications and Mass Communications (Minsvyaz) 15.5 Further Research Areas Chapter 16: Cyber Warfare Capabilities by Nation-State 16.1 Australia 16.2 Brazil 16.3 Canada 16.4 Czech Republic 16.5 Democratic People's Republic of Korea 16.6 Estonia 16.7 European Union 16.8 France 16.9 Germany 16.10 India 16.11 Iran 16.12 Israel 16.13 Italy 16.14 Kenya 16.15 Myanmar 16.16 NATO 16.17 Netherlands 16.18 Nigeria 16.19 Pakistan 16.20 People's Republic of China 16.21 Poland 16.22 Republic of Korea 16.23 Russian Federation 16.24 Singapore 16.25 South Africa 16.26 Sweden 16.27 Taiwan (Republic of China) 16.28 Turkey 16.29 United Kingdom Chapter 17: US Department of Defense Cyber Command and Organizational Structure 17.1 Summary 17.2 Organization Chapter 18: Active Defense for Cyber: A Legal Framework for Covert Countermeasures 18.1 Covert Action 18.2 Cyber Active Defense Under International Law 18.3 Cyber Active Defenses as Covert Action Under International Law 18.4 Cyber Attacks Under International Law: Nonstate Actors Colophon
Rezensionen
"[Dem Autor] geht es vornehmlich um die Darstellung von Zusammenhängen und Interessenlagen. Dies ist ihm in jeder Hinsicht gelungen - spannend ist die Lektüre allemal." -- c't, Februar 2010
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309