O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required


Book Description

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

  • Historical perspectives of the development of malware as it evolved into a viable economic endeavour
  • Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime
  • Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy
  • Provides unique insights, analysis, and useful tools for justifying corporate information security budgets
  • Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement
  • Includes real world cybercrime case studies and profiles of high-profile cybercriminals

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Acknowledgements
  6. Dedication
  7. About the Authors
  8. About the Technical Editor
  9. Foreword
  10. Preface
    1. How This Book is Organized
  11. Introduction. Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
    1. Introduction
    2. Classifying the Cyber Actor
    3. Criminal and Organized Syndicates
    4. Nation States
    5. Summary
    6. References
  12. Chapter 1. Psychological and Cultural Trends
    1. Introduction
    2. Psychology of Attackers
    3. Psychology of Victims
    4. Attackers’ Familiarity with Human Psychology
    5. Motivations and Event-Driven Trends
    6. Summary
    7. References
  13. Chapter 2. Seasons of Change
    1. Introduction
    2. From Experiment to Exposé to Exploit
    3. Timeline: Innovations, Intrigue, and Intrusions
    4. Propaganda and Lulz
    5. Summary
    6. References
  14. Chapter 3. Drivers and Motives
    1. Introduction
    2. Technology Advancements and Their Effect on Crime
    3. Motives for Committing Cybercrime
    4. Opportunistic Cybercrime Cost Model
    5. Summary
    6. References
  15. Chapter 4. Signal-to-Noise Ratio
    1. Introduction
    2. Cyber Attacks: The Early Years
    3. The Pendulum Swings Back: Hacktivism and DDoS
    4. Summary
    5. References
  16. Chapter 5. Execution
    1. Introduction
    2. How Cybercriminals Execute Their Schemes Using Malicious Code and Content for Profit
    3. Identifying the Market
    4. Identifying the Target Audience
    5. Summary
    6. References
  17. Chapter 6. From Russia with Love
    1. Introduction
    2. A Bit of History
    3. The Cold War and Its Significance to Cybercrime
    4. Why the Russians Understand Economics Better Than You Do
    5. Cyber Thieves
    6. Cyber Rackets: Botnets, Malware, Phishing, and the Rise of the Russian Cybercriminal Underground
    7. Summary
    8. References
  18. Chapter 7. The China Factor
    1. Introduction
    2. Economic Growth
    3. Industrial Espionage
    4. Reducing the Risk of Industrial Espionage
    5. Security Spend Model
    6. Summary
    7. References
  19. Chapter 8. Pawns and Mules
    1. Introduction
    2. Pawns in the Game
    3. The Heartland Breach
    4. Acquiring and Transporting Stolen Assets without Being Detected
    5. From Money Mules to Money Laundering
    6. Summary
    7. References
  20. Chapter 9. Globalization: Emerging Markets Aren’t Just for Traditional Investors Anymore
    1. Introduction
    2. References
  21. Chapter 10. America, Land of Opportunity
    1. Introduction
    2. The Birth of the Modern Internet
    3. When Purpose Is Corrupted by Conflicting Intent
    4. Defining the Norm: The Era of the Cybercriminal on America’s Internet
    5. Locking the Doors while Opening the Windows: Inviting the Cybercriminal into Our World and Our Lives
    6. Does Education Decrease Cybercrime in the United States?
    7. Industrial Espionage and the American Experience
    8. When the Crime Is Not Motivated by Economics
    9. Summary
    10. References
  22. Chapter 11. Global Law Enforcement
    1. Introduction
    2. Cybercrime Today
    3. U.S. Federal Law Enforcement
    4. Nonfederal Law Enforcement
    5. Summary
    6. References
  23. Chapter 12. The Road Ahead
    1. Introduction
    2. John Pirc: “Keeping Security Real”
    3. Will Gragido
    4. Nick Selby
    5. Daniel Molina
    6. Summary
    7. References
  24. Index