CyberWar

Si Vis Pacem, Para Bellum

By

DARKNET & LAW

Amazon Price: N/A (as of March 23, 2017 18:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

DARKNET & LAW

Darknet or Dark Web is a concrete reality today, a new paradigm which promises to irreversibly change the game of the Internet. Darknet brings alongwith it various complicated legal, policy and regulatory challenges. Lot of these legal challenges are beginning to emerge, at the time of writing.
Read More

By

Chinese Cyber Warfare: China’s Cyber Incursions, Strategic Method, Information Warfare Threat – Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing

Amazon Price: N/A (as of March 23, 2017 20:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's Cyber Incursions: A Theoretical Look at What They See and Why They Do It Based on a Different Strategic Method of Thought – This 2013 paper discusses the strategy behind China's cyber activities. The paper examines the Chinese concept of strategy and how it motivates China's cyber actions. These actions take the form of reconnaissance and system sabotage concepts that result in the fulfillment of strategy and in the development of a preemptive and offensive information deterrence disposition. The paper then examines China's response to the recent Mandiant security firm's report that accused the People's Liberation Army of compliance in attacking 115 US companies since 2006. China's next generation of quantum communications research is briefly discussed as well. The conclusions list the author's opinion regarding how to handle the Chinese in the future, through confrontation or dialogue, based on their thought process. This author argues for interceding into Chinese strategic concepts and changing the objective basis behind their cyber activities. China's invasive cyber activities make perfect sense—to them. Through extensive reconnaissance activities, China gains leverage in three areas: its ability to establish a cyber strategic advantageous posture over potential opponents; its ability to identify key nodes in an opponent's network and gain the potential ability to conduct system sabotage against them if necessary; and its ability to develop a cyber deterrence concept of Chinese-make through the construction of a new type of "show of force," such as the identification and revelation of a potential opponent's cyber geography that deters an opponent from acting. Cyber espionage activities are activated due to a specific strategic thought process and resulting paradigm that subsequently uncovers strategic opportunities.

Chinese Information Warfare: A Phantom Menace or Emerging Threat? Mao Tse-tung counseled, "To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds." Few concepts mesh so contextually with Mao than the Chinese approach to Information Warfare (IW). As the People's Republic of China struggles with its national military strategy, IW offers opportunities to win wars without the traditional clash of arms.
Read More

By

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Rating: 
Amazon Price: N/A (as of March 24, 2017 00:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Read More

By

Rtfm: Red Team Field Manual

Rating: 
Amazon Price: $10.00 $9.00 You save: $1.00 (10%). (as of March 24, 2017 02:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

By

Hacking Secrets: What Hackers don’t Want You to Know?

Rating: 
Amazon Price: $9.99 $9.99 (as of March 24, 2017 02:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacking is something that many people fall victim to at some point in their life. You may only experience an amateur hacker breaking into your information ‘just because they can’ and leaving again without taking anything. On the other hand, you may experience hacking where your information is stolen and someone uses it to take money or even your identity. Any type of hacking can leave you feeling vulnerable, even if they don’t take anything while they are there. That’s a feeling that you never want to have and the idea that someone could take anything you own just that easily is terrifying as well. This book is an introduction to protecting yourself from hacking. Find out more about what hackers do to get into your information and your system and what you can do to keep them out. Make sure that you understand different skills and techniques from how to create a proper password and choose a good virus software to how you should be storing your information for the most security. All of this and more are included in this book. Don’t miss out on it!

/* */