CyberWar

Si Vis Pacem, Para Bellum

By

Cyberterrorism After Stuxnet – Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks

Rating: 
Amazon Price: N/A (as of March 24, 2017 01:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Public government statements have cited cyber-attacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone in the arena of cybersecurity because, although a malware attack on industrial control systems was long believed to be theoretically possible, it was different to see malware used in reality to cause real physical damage. Stuxnet demonstrated that a sufficiently determined adversary with sufficient resources might be able to damage U.S. critical infrastructure physically through a cyber attack. Did Stuxnet change the threat of cyber-terrorism?

This monograph examines cyberterrorism before and after Stuxnet by addressing three questions: 1) Motive—Are terrorists interested in launching cyber-attacks against U.S. critical infrastructures? 2) Means —Are terrorists building capabilities and skills for cyberattacks? and, 3) Opportunity—How vulnerable are U.S. critical infrastructures? Answers to these questions give a characterization of the post-Stuxnet cyberterrorism threat. The next question is why a major cyber-terrorist attack has not happened yet; this is explained from a cost-benefit perspective. Although cyberterrorism may not be an imminent threat, there are reasons to be concerned about the long-term threat and inevitability of cyberattacks. It is important to assess frequently the threat landscape and current government policies for enhancing the protection of national infrastructures.
Read More

By

Propaganda, Power and Persuasion: From World War I to Wikileaks (International Library of Historical Studies)

Amazon Price: N/A (as of March 23, 2017 20:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As Philip Taylor has written, ‘The challenge (of the modern information age) is to ensure that no single propaganda source gains monopoly over the information and images that shape our thoughts. If this happens, the war propagandists will be back in business again.’

Propaganda came of age in the Twentieth Century. The development of mass- and multi-media offered a fertile ground for propaganda while global conflict provided the impetus needed for its growth. Propaganda has however become a portmanteau word, which can be interpreted in a number of different ways. What are the characteristic features of propaganda, and how can it be defined?
Read More

By

GlastopfNG: A Web Attack Honeypot

Amazon Price: $70.00 $70.00 (as of March 23, 2017 22:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Today we find web applications in every environment independent of a company's size and even in home networks. This fact made web applications also attractive to cyber criminals as there are new attack vectors like Cross Site Scripting, Remote File Inclusions (RFI) and SQL Injections. Such so called web based attacks can be found on every vulnerability statistic because of these attacks are so widespread. Criminals not only break into web applications, they also overtake whole web servers which than can become part of a botnet or even become a command and control server of such. GlastopfNG, is a honeypot specialized on simulating a vulnerable web server/application to become a target of automated or even manual attack. Instead of trying to block these attacks Glastopf tries to get as much information as possible about the attacker and the used attack itself. This gathered information can then be used in different ways to protect real applications in the future against such attacks.

By

Revolution 2.0: The Power of the People Is Greater Than the People in Power: A Memoir

Rating: 
Amazon Price: $26.00 $19.16 You save: $6.84 (26%). (as of March 24, 2017 10:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The revolutions that swept the Middle East in 2011 surprised and captivated the world. Brutal regimes that had been in power for decades were overturned by an irrepressible mass of freedom seekers. Now, one of the figures who emerged during the Egyptian uprising tells the riveting inside story of what happened and shares the keys to unleashing the power of crowds.

Wael Ghonim was a little-known, thirty-year-old Google executive in the summer of 2010 when he anonymously launched a Facebook page to protest the death of one Egyptian man at the hands of security forces. The page’s following expanded quickly and moved from online protests to a nonconfrontational movement.
Read More

By

Deep Web: how not to drown: Step-by-Step Guide for Anonymus (provide online security and go out into the dark web)

Rating: 
Amazon Price: N/A (as of March 24, 2017 10:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Deep Web: how not to drown

Step-by-Step Guide for Anonymus (provide online security and go out into the dark web)
Read More

/* */