Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Rating: 
Amazon Price: $28.00 $5.47 You save: $22.53 (80%). (as of June 24, 2017 15:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An inside look at who’s watching you, what they know and why it matters. We are being watched.

We see online ads from websites we’ve visited, long after we’ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what’s in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
Continue reading “Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance”

Computer Attack and Cyberterrorism

Computer Attack and CyberterrorismMany international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organizations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called ‘bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack.The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices. Appendices to this book describe computer viruses, spyware, and ‘bot networks', and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.

Price: $37.00

Click here to buy from Amazon

Disinformation: Former Spy Chief Reveals Secret Strategies for Undermining Freedom, Attacking Religion, and Promoting Terrorism

Rating: 
Amazon Price: N/A (as of June 24, 2017 17:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The highest-ranking Soviet bloc intelligence official ever to defect to the West, Lt. Gen. Ion Mihai Pacepa is at it again.A quarter century ago, in his international bestseller Red Horizons, Pacepa exposed the massive crimes and corruption of his former boss, Romanian President Nicolae Ceausescu, giving the dictator a nervous breakdown and inspiring him to send assassination squads to the U.S. to find his former spy chief and kill him. They failed. On Christmas Day 1989, Ceausescu was executed by his own people at the end of a trial whose accusations came almost word-for-word out of Red Horizons.Today, still living undercover in the United States, the man credited by the CIA as the only person in the Western world who single-handedly demolished an entire enemy espionage service–the one he himself managed–takes aim at an even bigger target: the exotic, widely misunderstood but still astonishingly influential realm of the Russian-born "science" of disinformation.Indeed, within these pages, Pacepa, along with his co-author, historian and law professor Ronald Rychlak, expose some of the most consequential yet largely unknown disinformation campaigns of our lifetime. Here the reader will discover answers to many crucial questions of the modern era: Why, during the last two generations, has so much of the Western world turned against its founding faith, Christianity?Why have radical Islam, jihad and terrorism burst aflame after a long period of apparent quiescence?Why is naked Marxism increasingly manifesting in America and its NATO allies? What really happened to Russia after the Berlin Wall came down? Like the solution to a giant jigsaw puzzle lacking one crucial piece, Disinformation authoritatively provides the missing dimension that makes the chaos of the modern world finally understandable.By its very nature, a disinformation campaign can work only if the seemingly independent Western press accepts intentionally fabricated lies and presents them to the public as truth.Thus, Pacepa and Rychlak also document how the U.S. "mainstream media's" enduring sympathy for all things liberal-left has made it vulnerable to–indeed, the prime carrier of–civilization-transforming campaigns of lying, defamation and historical revisionism that turn reality on its head. In Disinformation, you'll discover:How destroying the reputation of good leaders has been developed into a high art and science.How Pope Pius XII –a generation ago the world's most high-profile Christian leader, who personally saved countless Jews from Hitler's Holocaust–was transformed, through the magic of disinformation, into a Nazi sympathizer.How Christianity and Judaism have been targeted for constant denigration and defamation through an ongoing campaign of disinformation.How the Soviet bloc planted 4,000 agents of influence in the Islamic world, armed with hundreds of thousands of copies of the most infamous anti-Semitic book in history, to fan the flames of ancient Arab resentments against the U.S. and Israel and sow the seeds of anti-Semitism that would later bloom in the form of violence and terror toward Jews and Christians.How the defamatory attacks on American soldiers John Kerry made before Congress upon his return from Vietnam–charges later discredited and repudiated–were identical to a contemporaneous KGB disinformation campaign concocted to turn Americans against their own leaders.How supposedly respectable institutions like the World Council of Churches have long been infiltrated and controlled by Russian intelligence.How much of the world came to believe that the U.S. government itself masterminded the assassination of President John F. Kennedy.How the Soviet Union has been transformed into the first intelligence dictatorship in history.How disinformation is still very much alive in the age of Obama, remaining a powerful engine in the ongoing socialist transformation of America.All this and much more is meticulously documented in Disinformation, with the credibility of an eyewitness who was not only there, but actively involved as a Soviet bloc spy chief–who, thanks to a crisis of conscience, "left the dark side" and came to America to help shine a light on the greatest source of political evil of the modern age. "This remarkable book will change the way you look at intelligence, foreign affairs, the press, and much else besides." – R. James Woolsey, former Director of Central Intelligence

Proactive Botnet Detection: Through Characterization of Distributed Denial of Service Attacks

Rating: 
Amazon Price: $5.90 $5.90 (as of June 24, 2017 10:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In this quantitative quasi-experimental study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect botnets by identifying egressing distributed denial of service attack packets at the source of the attack. A sample Dark DDoSer botnet was constructed and used to launch a distributed denial of service attack. The characteristics of the distributed denial of service attacks were used as the independent variables in a quasi-experiment where network traffic was monitored with Snort to detect DDoS packets. The dependent variable for the experiment was false positive alerts for the DDoS packets. The findings showed that the characteristics of a distributed denial of service attack can be used to pro-actively detect botnets through egress monitoring.