Introduction

It is 2006. An American businessman sits down at his computer to check his e-mail. A mysterious message from an “Israel cyber-terrorist hunter” claims that Hezbollah has hijacked one of his company’s IP addresses in order to disseminate their propaganda on the Internet.1 Not taking it seriously, but just to be sure, he calls his IT office. A few hours later, they confirm the scary truth; the Israeli sender was correct—one of the world’s most fervent insurgent groups had used his IT infrastructure for their strategic communication.

Two years later. The political situation between Georgia and Russia becomes nerve-wracking as tensions rise over Georgia’s recent hostilities with South Ossetia. Reports indicate that Russian armor formations ...

Get Introduction to Cyber-Warfare now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.