Cyberwar: Bedrohung für die Informationsgesellschaft

Cyberwar: Bedrohung für die Informationsgesellschaft

Today, the Internet is entering a new stage which will have a much stronger impact on the daily lives of all kinds of organizations. The next communication paradigm offers an improved access to mobility information, offering people and all organizations that deal with mobile devices the ability to access information whenever and wherever necessary. We really are at the edge of a new technological revolution, based on the ubiquity of information through the use of mobile devices and telecommunications. Furthermore, historical tendencies lead us to believe that the impact both on people and on organizations of this technological wave will be both faster and more powerful than any previous one. To the individual, information ubiquity results in the necessity to have immediate access to information. The strategic tactic and operational impact in organizations will therefore be incomparably deeper than in previous organizational management change using technology such as total quality management or business process re-engineering.

IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.

Some of the areas we publish in:

-Biomedicine
-Oncology
-Artificial intelligence
-Databases and information systems
-Maritime engineering
-Nanotechnology
-Geoengineering
-All aspects of physics
-E-governance
-E-commerce
-The knowledge economy
-Urban studies
-Arms control
-Understanding and responding to terrorism
-Medical informatics
-Computer Sciences

Price:

Click here to buy from Amazon

Spies Against Armageddon

Spies Against ArmageddonA powerful, vivid history of Israel’s intelligence services from the country’s independence in 1948, right up to Stuxnet and the current Middle East crises, describing the roots of both the triumphs and the screw-ups. Chapter 1 is titled “Stopping Iran,” focused on nuclear threats, and then readers are taken through the entire history.

Price: $16.99

Click here to buy from Amazon

 

 

 

 

Air Cyber Power and ADS-B Vulnerabilities

Dynamic Radar Map from Flightradar24.com

Exploring Potential ADS-B Vulnerabilities in The FAA NEXTGEN Air Transportation System
The Fog of a “Cyber” War

“It is late fall 2025; Al Qaeda sleeper cells target the disruption of airline traffic into multiple East coast airports during the busy travel season from Thanksgiving through Christmas.
ADS-B IN/OUT has been fully implemented by the FAA; all commercial airlines have invested heavily to comply with the mandate. Oil prices are at an all time high and flights are carrying minimal fuel loads to save money and offset the cost of avionics.

The goal: force multiple airplanes to divert; pilots, FAA controllers and passengers to lose faith in the system; and possibly cause enough chaos to the NAS system that a few lives are lost.

The plan: exploit the U.S. dependency on ADS-B IN/OUT and GPS for arrivals into busy airports, especially during low visibility conditions.

The teams: five two man teams have been put into play for the mission. They are provided with all the commercially available technology they will need, along with a few modified laptop computers, antennas and transmitters.

The targets: Regan National, Dulles, La Guardia, JFK and Philadelphia International airports. The terrorists have been tasked to park minivans with computers containing modified software that are coupled to ADS-B OUT transmitters. The software is designed to be remotely activated and controlled over an Internet connection. Each computer is programmed specifically for the targeted airport, and transmits 978MHz and 1090MHz signals out a boosted transmitter.

As a result, airlines on final approach will receive false targets on their displays. The terrorists ghost target injects also propagate to the FAA controller’s screens. The terrorists intended these spoofed targets, programmed at conflicting arrival and departure corridors as well as in runway incursion situations, to cause multiple airports to become temporarily unusable. The resulting domino effect causes aircraft diversions and delays that will lead to chaos.”

DONALD L. McCALLIE
Major, USAF
Degree of Master of Cyber Warfare
Air Force Institute of Technology
Wright-Patterson Air Force Base, Ohio, USA

Download Exploring Potential ADS-B Vulnerabilities in The FAA’s Nextgen Air Transportation System

Neuromancer

NeuromancerSPECIAL 20TH ANNIVERSARY EDITION —
THE MOST IMPORTANT AND INFLUENTIAL SCIENCE FICTION NOVEL OF THE PAST TWO DECADES

Twenty years ago, it was as if someone turned on a light. The future blazed into existence with each deliberate word that William Gibson laid down. The winner of Hugo, Nebula, and Philip K. Dick Awards, Neuromancer didn’t just explode onto the science fiction scene–it permeated into the collective consciousness, culture, science, and technology.

Today, there is only one science fiction masterpiece to thank for the term “cyberpunk,” for easing the way into the information age and Internet society. Neuromancer‘s virtual reality has become real. And yet, William Gibson’s gritty, sophisticated vision still manages to inspire the minds that lead mankind ever further into the future.

Price: $25.00

Click here to buy from Amazon

Practical Lock Picking: A Physical Penetration Tester’s Training Guide

Practical Lock Picking: A Physical Penetration Tester's Training GuideFor the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief “spy manuals” that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease.

Deviant’s material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly. Everything from straightforward lockpicking to quick-entry techniques like shimming, bumping, and bypassing is explained and shown.Whether you’re being hired to penetrate security or simply trying to harden your own defenses, this book is essential.

  • The author has taught 1000s of individuals at leading conferences like DEFCON and Shmoocon
  • Only up-to-date book available for the information security professional
  • This knowledge completes the penetration tester‘s toolkit for internal and external audits of a company’s security

Price: $34.95

Click here to buy from Amazon