Book description
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.
This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.
- Discover how Russian investment in social networks benefits the Kremlin
- Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa
- Explore the rise of anarchist groups such as Anonymous and LulzSec
- Look inside cyber warfare capabilities of nations including China and Israel
- Understand how the U.S. can legally engage in covert cyber operations
- Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations
Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.
Publisher resources
Table of contents
- Inside Cyber Warfare
- Foreword
- Preface
- 1. Assessing the Problem
-
2. The Rise of the Nonstate Hacker
- The StopGeorgia.ru Project Forum
- The Russian Information War
-
The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead
- Impact
- Overview of Perpetrators
-
Hackers’ Profiles
- Team Evil
- Cold Zero (aka Cold Z3ro or Roma Burner)
- Team Hell (aka Team H3ll or Team Heil)
- Agd_Scorp/Peace Crew (aka Agd_Scorp/Terrorist Crew)
- Jurm Team
- C-H Team (aka H-C Team)
- Hackers Pal
- Gaza Hacker Team
- DNS Team
- !TeAm RaBaT-SaLe! (aka Team Rabat-Sale or Team Rabat-Sala)
- DZ Team
- Ashianeh Security Group
- Nimr al-Iraq (“The Tiger of Iraq”) and XX_Hacker_XX
- Methods of Attack
- Israeli Retaliation
- Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria
- Are Nonstate Hackers a Protected Asset?
- 3. The Legal Status of Cyber Warfare
-
4. Responding to International Cyber Attacks as Acts of War
- The Legal Dilemma
- The Law of War
- Nonstate Actors and the Law of War
-
Analyzing Cyber Attacks under Jus ad Bellum
- Cyber Attacks as Armed Attacks
- Establishing State Responsibility for Cyber Attacks
- The Duty to Prevent Cyber Attacks
- Support from International Conventions
- Support from State Practice
- Support from the General Principles of Law
- Support from Judicial Opinions
- Fully Defining a State’s Duty to Prevent Cyber Attacks
- Sanctuary States and the Practices That Lead to State Responsibility
- The Choice to Use Active Defenses
- Conclusion
- 5. The Intelligence Component to Cyber Warfare
- 6. Nonstate Hackers and the Social Web
- 7. Follow the Money
- 8. Organized Crime in Cyberspace
- 9. Investigating Attribution
-
10. Weaponizing Malware
-
A New Threat Landscape
- StopGeorgia.ru Malware Discussions
- Twitter as DDoS Command Post against Iran
- Social Engineering
- Channel Consolidation
- An Adversary’s Look at LinkedIn
- BIOS-Based Rootkit Attack
- Malware for Hire
- Anti-Virus Software Cannot Protect You
- Targeted Attacks Against Military Brass and Government Executives
-
A New Threat Landscape
- 11. The Role of Cyber in Military Doctrine
- 12. A Cyber Early Warning Model
- 13. Advice for Policymakers from the Field
- 14. Conducting Operations in the Cyber-Space-Time Continuum
-
15. The Russian Federation: Information Warfare Framework
- Russia: The Information Security State
-
Russian Ministry of Defense
- Administrative Changes
- Electronic Warfare Troops
- The Federal Service for Technical and Export Control (FSTEC)—Military Unit (Vch) 96010
- 5th Central Research and Testing Institute of the Russian Defense Ministry (5th TSNIII)—Military Unit (Vch) 33872
- 18th Central Research Institute of the Russian Defense Ministry (18th CRI MOD)—Military Unit (Vch) 11135
- 27th Central Research Institute of the Russian Defense Ministry (27th CRI MOD)—Military Unit (Vch) 01168
-
Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)
- Federal Security Service Information Security Center (FSB ISC)—Military Unit (Vch) 64829
- Russian Federal Security Service Center for Electronic Surveillance of Communications (FSB TSRRSS)—Military Unit (Vch) 71330
- FSB Administrative Centers for Information Security
- Russian Interior Ministry Center E (MVD Center E)
- Russian Interior Ministry Cyber Crimes Directorate (MVD Directorate K)
- Russian Federal Security Organization (FSO)—Military Unit (Vch) 32152
- Russian Federation Ministry of Communications and Mass Communications (Minsvyaz)
- Further Research Areas
-
16. Cyber Warfare Capabilities by Nation-State
- Australia
- Brazil
- Canada
- Czech Republic
- Democratic People’s Republic of Korea
- Estonia
- European Union
- France
- Germany
- India
- Iran
- Israel
- Italy
- Kenya
- Myanmar
- NATO
- Netherlands
- Nigeria
- Pakistan
- People’s Republic of China
- Poland
- Republic of Korea
- Russian Federation
- Singapore
- South Africa
- Sweden
- Taiwan (Republic of China)
- Turkey
- United Kingdom
- 17. US Department of Defense Cyber Command and Organizational Structure
- 18. Active Defense for Cyber: A Legal Framework for Covert Countermeasures
- Index
- About the Author
- Colophon
- Copyright
Product information
- Title: Inside Cyber Warfare, 2nd Edition
- Author(s):
- Release date: December 2011
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781449325459
You might also like
book
Inside Cyber Warfare, 3rd Edition
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use …
book
Cyber Warfare
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and …
book
Cyber Warfare, 2nd Edition
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. …
book
The Basics of Cyber Warfare
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical …