May 2013
Beginner
336 pages
13h 18m
English
Outline
• The Predator UAV
• Hacking the Predator feed
• The Predator’s vulnerability
• Attribution and the Kata’ib Hezbollah
• The history of the Predator vulnerability
In Chapter 7, we discussed acts of cyber espionage that suggest Chinese involvement. These operations focused on either massive data exfiltration for the purposes of stealing intellectual property and industrial information ...