Skip to Main Content
Inside Cyber Warfare
book

Inside Cyber Warfare

by Jeffrey Carr
December 2009
Intermediate to advanced content levelIntermediate to advanced
232 pages
7h 30m
English
O'Reilly Media, Inc.
Content preview from Inside Cyber Warfare

Chapter 7. Follow the Money

Cyberspace as a domain for modern warfare creates a lot of complexities that don’t exist in other types of conflicts. You cannot visually identify the enemy, nor be sure what his nationality is. The one thing that you can count on is that someone has to pay for the necessities of virtual combat. Therefore, one sound strategy in any cyber investigation is to follow the money trail created by the necessary logistics of organizing a cyber attack—domain registration, hosting services, acquisition of software, bandwidth, and so on.

False Identities

One of the main reasons why malicious activities can prosper online is due to lax verification of domain registration data, also known as WHOIS information. Starting with Internet Corporation for Assigned Names and Numbers (ICANN) and continuing with hosting companies and accredited domain registrars of all sizes, verification is not universally enforced.

Fortunately, one of the forensic methods that can crack false identity data is the global trend toward social computing. In the digital world of the Internet, as in physical space, you leave evidence of where you’ve been.

If you’re an ardent social computing fan who is active in Facebook, MySpace, LiveJournal, or Twitter, your virtual footprint will be very extensive. If you make your living on the Internet as a web service provider or forum administrator, your footprint will be even larger.

The IDC is an organization that studies how much data is generated by individuals ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 2nd Edition

Inside Cyber Warfare, 2nd Edition

Jeffrey Carr
Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Warfare, 2nd Edition

Cyber Warfare, 2nd Edition

Jason Andress, Steve Winterfeld
The Basics of Cyber Warfare

The Basics of Cyber Warfare

Jason Andress, Steve Winterfeld

Publisher Resources

ISBN: 9781449377229Errata Page