It is 2006. An American businessman sits down at his computer to check his e-mail. A mysterious message from an “Israel cyber-terrorist hunter” claims that Hezbollah has hijacked one of his company’s IP addresses in order to disseminate their propaganda on the Internet.1 Not taking it seriously, but just to be sure, he calls his IT office. A few hours later, they confirm the scary truth; the Israeli sender was correct—one of the world’s most fervent insurgent groups had used his IT infrastructure for their strategic communication.
Two years later. The political situation between Georgia and Russia becomes nerve-wracking as tensions rise over Georgia’s recent hostilities with South Ossetia. Reports indicate that Russian armor formations ...
Get Introduction to Cyber-Warfare now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.