This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States. This war is neither conventional nor accidental. The U.S. military is at a disadvantage because it is part of a system of government that is democratic, decentralized and mostly separated from American businesses. This system has served the country well but is not a path that China sees as worth following. This book is not a "how to" book of strategies that might be developed to fight a cyberwar. It is a way to grasp and categorize what the Chinese are already doing, to make sense of it. Until the U.S. sees itself as in a war, it cannot begin to effectively prosecute it.
Cyberspace attacks continue in the United States with many of these incidents crossing international borders. The global nature of cyberspace makes it difficult to determine if a breach into a computer system is an act of cyberterrorism, cyber crime, or cyber warfare. An attack to steal credit card information may be all three simultaneous. The Department of Defense is ready to protect the nation against all enemies in the air, on the land, or on the sea. These domains are well protected with military forces postured to respond. Our nation’s economy is under constant attack through the cyberspace domain. Attacks through electronic means happen at the speed of light and require a quick response to contain. Proactive approaches defend our borders, but not our economy. Instead, the United States has a passive defense relying on the goodwill of commercial enterprises and the investigative approaches of law enforcement agencies. Through the Untied States Cyber Command, the Department of Defense has capability that can be used to defend America. This work looks at the roles and responsibilities of the Department of Defense as it relates to Homeland Defense and the protection of credit card information transitioning across the Internet.
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.
*First book to demonstrate and explore controversial network strike back and countermeasure techniques.
Continue reading “Aggressive Network Self-Defense”
An inside look at who’s watching you, what they know and why it matters. We are being watched.
We see online ads from websites we’ve visited, long after we’ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what’s in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
Continue reading “Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance”
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.