CyberWar

Si Vis Pacem, Para Bellum

By

National Defense Strategy – United States of America

National Defense Strategy - United States of AmericaThe United States, our allies, and our partners face a spectrum of challenges, including violent transnational extremist networks, hostile states armed with weapons of mass destruction, rising regional powers, emerging space and cyber threats, natural and pandemic disasters, and a growing competition for resources. The Department of Defense must respond to these challenges while anticipating and preparing for those of tomorrow. We must balance strategic risk across our responses, making the best use of the tools at hand within the U.S. Government and among our international partners. To succeed, we must harness and integrate all aspects of national power and work closely with a wide range of allies, friends and partners. We cannot prevail if we act alone.

As noted in the 2006 QDR, state actors no longer have a monopoly over the catastrophic use of violence. Small groups or individuals can harness chemical, biological, or even crude radiological or nuclear devices to cause extensive damage and harm. Similarly, they can attack vulnerable points in cyberspace and disrupt commerce and daily life in the United States, causing economic damage, compromising sensitive information and materials, and interrupting critical services such as power and information networks. National security and domestic resources may be at risk, and the Department must help respond to protect lives and national assets. The Department will continue to be both bulwark and active protector in these areas. Yet, in the long run the Department of Defense is neither the best source of resources and capabilities nor the appropriate authority to shoulder these tasks. The comparative advantage, and applicable authorities, for action reside elsewhere in the U.S. Government, at other levels of government, in the private sector, and with partner nations. DoD should expect and plan to play a key supporting role in an interagency effort to combat these threats, and to help develop new capacities and capabilities, while protecting its own vulnerabilities.

In the contemporary strategic environment, the challenge is one of deterring or dissuading a range of potential adversaries from taking a variety of actions against the U.S. and our allies and interests. These adversaries could be states or non-state actors; they could use nuclear, conventional, or unconventional weapons; and they could exploit terrorism, electronic, cyber and other forms of warfare. Economic interdependence and the growth of global communications further complicate the situation. Not only do they blur the types of threats, they also exacerbate sensitivity to the effects of attacks and in some cases make it more difficult to attribute or trace them. Finally, the number of potential adversaries, the breadth of their capabilities, and the need to design approaches to deterrence for each, create new challenges.

An underlying assumption in our understanding of the strategic environment is that the predominant near-term challenges to the United States will come from state and non-state actors using irregular and catastrophic capabilities. Although our advanced space and cyber-space assets give us unparalleled advantages on the traditional battlefield, they also entail vulnerabilities.

China is developing technologies to disrupt our traditional advantages. Examples include development of anti-satellite capabilities and cyber warfare. Other actors, particularly non-state actors, are developing asymmetric tactics, techniques, and procedures that seek to avoid situations where our advantages come into play.

Download National Defense Strategy – United States of America

By

Penetration Testing: A Hands-On Introduction to Hacking

Rating:
Amazon Price: N/A (as of April 25, 2015 02:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment – including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Read More

By

Practical SCADA for Industry (IDC Technology)

Practical SCADA for Industry (IDC Technology)A SCADA system gathers information, such as where a leak on a pipeline has occurred, transfers the information back to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and control, such as determining if the leak is critical, and displaying the information in a logical and organized fashion. SCADA systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system.

An engineer’s introduction to Supervisory Control and Data Acquisition (SCADA) systems and their application in monitoring and controlling equipment and industrial plant.

Essential reading for data acquisition and control professionals in plant engineering, manufacturing, telecommunications, water and waste control, energy, oil and gas refining and transportation.

Provides the knowledge to analyse, specify and debug SCADA systems, covering the fundamentals of hardware, software and the communications systems that connect SCADA operator stations

Price: $66.95

Click here to buy from Amazon

By

50 GH/s Bitcoin Miner (Single SC) *Preorder*

Rating:
Amazon Price: N/A (as of July 30, 2013 00:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Pre-order Terms: Bitforce SC (ASIC) products are in final stage development with initial shipping scheduled for the last half of April 2013. Products are shipped according to placement in the order queue, and delivery may take 2 months or more after order. All sales are final.

By

KeyGrabber USB KeyLogger 8MB Black

Rating:
Amazon Price: N/A (as of April 24, 2015 14:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

USB KeyLogger 8MB Black — Small, fast, and smart — One of the world's smallest and smartest USB hardware keylogger. This keystroke recorder has 8 Megabytes of memory capacity equal to more than 8,000,000 keystrokes and over 4,000 pages of text. Super fast data retrieve is achieved by switching into Flash Drive mode for download. Completely transparent for computer operation, no software or drivers required. Supports national keyboard layouts. — Installation of the hardware USB keylogger in record mode is quick and easy. Simply plug it in between the USB keyboard and the USB port. No software or drivers are required. The USB keylogger will automatically start recording all data typed on the keyboard to the internal flash disk. Disconnect the USB keyboard from the USB port at the computer or hub. This can be done even with the computer up and running. Connect the hardware USB keylogger between the USB keyboard and the USB port. Keystroke logging will start automatically. Once data has been captured in record mode, you can retrieve it on any computer with a USB port. This is done by switching to Flash Drive mode. ___________ Applications: – Observe WWW, E-mail & chat usage by children and employees – Monitor employee productivity – Protect your child from on-line hazards and predators – Save a copy of typed text – Monitor your own computer on suspicion of unauthorized use by others. ____________________________________ Generally it's permitted to monitor your own computer, meaning you can watch what your kids and family are doing on the computer. It is obviously NOT LEGAL to use this device for any type spying, or stealing confidential data.