Inside Cyber Warfare, 3rd Edition

Book description

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber intelligence expert Jeffrey Caruso explores the latest developments in cyber espionage and warfare, including the growing role of civilian hackers, the use of social media for nefarious purposes, and the targeting of nonmilitary infrastructure.

Geopolitical cyber attacks increased by 440% between 2009 and 2018, demonstrating how this aspect of modern warfare will likely escalate in the future. Inside Cyber Warfare features an exclusive deep dive into the wartime operations of an offensive cyber unit of Ukraine's Ministry of Defense as it works to defend the nation against Russian forces, particularly since the 2022 invasion.

  • Explore the legal status of cyber warfare
  • Identify information manipulation on social media
  • Learn why you should think like an offensive operator when defending, and like a defensive operator when attacking
  • Distinguish reality from fiction regarding a "cyber armageddon"
  • Learn what nations can do to defend themselves

Publisher resources

View/Submit Errata

Table of contents

  1. Brief Table of Contents (Not Yet Final)
  2. 1. How Did We Get Here?
    1. Focus for Chapter 1
    2. Von Neumann’s Monster
    3. Is Software Killing People?
    4. To Disclose, or Not To Disclose, or to Responsibly Disclose
      1. Sony PlayStation Network
      2. Equifax
      3. Twitter
      4. Problematic Reporting of Exploits and Vulnerabilities
      5. The Exploit Database
      6. A Protection Racket?
    5. Conclusion
  3. 2. Who Did It?
    1. Attribution is Inferred, not Deduced
    2. Examining Our Assumptions
      1. Premises about resources and relation to governments
      2. Premises about the setup of teams
      3. Premises about data
      4. The Exclusive Use Assumption
      5. The Working Hours Assumption
      6. The “Criminals versus Spies” Assumption
      7. Valid Concerns
    3. The Need For Independent Fact-Finding
    4. A Proposed International Attribution Mechanism Modeled After The OPCW
    5. Conclusion
  4. 3. Establishing Corporate Accountability
    1. Pay for Protection
    2. It All Comes Down to Cost Calculation
      1. The Railroad
      2. Shipping
      3. Automobiles
      4. Software
    3. The Move to Software Regulation
      1. As-Is
      2. Independent Testing
      3. The National Cyber Strategy
    4. Summary
  5. 4. The New Enmeshed War Strategy
    1. Cognitive Warfare and Operations in the Information Environment
    2. A Central Figure: Yevgeny Prigozhin
      1. The Wagner Group
      2. The Internet Research Agency
      3. Case Study #1: Ukraine
      4. Case Study #2: Syria
      5. Case Study #3: Mali
    3. Platforms for Disinformation and Misinformation
      1. Twitter
      2. TikTok
    4. Using Social Media for Surveillance
      1. F3EAD
      2. Benign Surveillance (Not) and Real-Time Bidding
    5. Best Practices
      1. Disinformation and Misinformation
      2. Cyber Warfare
    6. Summary
  6. About the Author

Product information

  • Title: Inside Cyber Warfare, 3rd Edition
  • Author(s): Jeffrey Caruso
  • Release date: October 2024
  • Publisher(s): O'Reilly Media, Inc.
  • ISBN: 9781098138516