Amazon Price:$27.99$16.99You save:$11.00 (39%)(as of July 4, 2020 05:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
A former FBI Special Agent, U.S. Army officer and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.
Clint Watts electrified the nation when he testified in front of the Senate Select Committee on Intelligence regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your social media information and that of your family, friends and colleagues to map your social networks, identify your vulnerabilities, master your fears and harness your preferences. Continue reading “Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News”
Terrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers of terrorists sabotaging the Internet, surprisingly little is known about terrorists’ actual use of the Internet.
In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of websites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on a seven-year study of the World Wide Web, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures and warns that this cyberwar may cost us dearly in terms of civil rights.
Illustrated with numerous examples taken from terrorist websites, Terror on the Internetoffers the definitive introduction to this emerging and dynamic arena. Weimann lays bare the challenges we collectively face in confronting the growing and increasingly sophisticated terrorist presence on the Net. A publication of the United States Institute of Peace, distributed by Potomac Books, Inc.
“It is late fall 2025; Al Qaeda sleeper cells target the disruption of airline traffic into multiple East coast airports during the busy travel season from Thanksgiving through Christmas. ADS-B IN/OUT has been fully implemented by the FAA; all commercial airlines have invested heavily to comply with the mandate. Oil prices are at an all time high and flights are carrying minimal fuel loads to save money and offset the cost of avionics.
The goal: force multiple airplanes to divert; pilots, FAA controllers and passengers to lose faith in the system; and possibly cause enough chaos to the NAS system that a few lives are lost.
The plan: exploit the U.S. dependency on ADS-B IN/OUT and GPS for arrivals into busy airports, especially during low visibility conditions.
The teams: five two man teams have been put into play for the mission. They are provided with all the commercially available technology they will need, along with a few modified laptop computers, antennas and transmitters.
The targets: Regan National, Dulles, La Guardia, JFK and Philadelphia International airports. The terrorists have been tasked to park minivans with computers containing modified software that are coupled to ADS-B OUT transmitters. The software is designed to be remotely activated and controlled over an Internet connection. Each computer is programmed specifically for the targeted airport, and transmits 978MHz and 1090MHz signals out a boosted transmitter.
As a result, airlines on final approach will receive false targets on their displays. The terrorists ghost target injects also propagate to the FAA controller’s screens. The terrorists intended these spoofed targets, programmed at conflicting arrival and departure corridors as well as in runway incursion situations, to cause multiple airports to become temporarily unusable. The resulting domino effect causes aircraft diversions and delays that will lead to chaos.”
Amazon Price:$17.99$4.04You save:$13.95 (78%)(as of July 4, 2020 05:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Amazon Price:$29.94(as of July 5, 2020 03:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studies of how he did it-and how people and companies can avoid falling victim to the spies among us.
American corporations now lose as much as $300 billion a year to hacking, cracking, physical security breaches, and other criminal activity. Millions of people a year have their identities stolen or fall victim to other scams. In Spies Among Us, Ira Winkler reveals his security secrets, disclosing how companies and individuals can protect themselves from even the most diabolical criminals. He goes into the mindset of everyone from small-time hackers to foreign intelligence agencies to disclose cost-effective countermeasures for all types of attacks. Continue reading “Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day”