Inside Cyber Warfare - Jeffrey Carr [184]
website defacements, Website defacements
Whackerz-Pakistan Cr3w, Pakistani Hackers and Facebook
WHOIS, Using WHOIS, Caveats to Using WHOIS, Caveats to Using WHOIS
limitations for investigative purposes, Caveats to Using WHOIS
Williams, Evan, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
World Wide Web and complexity theory, Conducting Operations in the Cyber-Space-Time Continuum
World Wide Web War I, China
worms and RBN, Organized Crime in Cyberspace
www.102fm.co.il, Impact
X
XX_Hacker_XX, Nimr al-Iraq (“The Tiger of Iraq”) and XX_Hacker_XX
Y
Yakunin, Vladimir, New Laws and Amendments
Yevloyev, Magomed, Assessing the Problem, Ingushetia Conflict, August 2009
Ynetnews.com, Impact
Z
zero-day exploits, Cyber: The Chaotic Domain, Research is the key to offensive capabilities, Protecting against 0day exploits
defending against, Protecting against 0day exploits
Zharov, Maksim, The Foundation for Effective Politics’ War on the Net (Day One), The Foundation for Effective Politics (FEP)
ZhZh (Zhivoy Zhurnal), The Foundation for Effective Politics’ War on the Net (Day One)
About the Author
Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, columnist for Symantec's Security Focus, and author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.
Mr. Carr is the Principal Investigator for Project Grey Goose, an Open Source intelligence investigation into the Russian cyber attacks on Georgia in August, 2008. The Grey Goose Phase I and Phase II reports have been widely read and well-received throughout the Intelligence, Defense, and Law Enforcement agencies of Western governments.
His work has been quoted in The New York Times, The Washington Post, The Guardian, BusinessWeek, Parameters, and Wired.
Colophon
The image on the cover of Inside Cyber Warfare is of light cavalry, as evidenced by the lack of armor adorning the soldier and his horse. During Roman-Germanic wars, the duties of reconnaissance, screening, and raiding fell on the light cavalry, while their more heavily armored counterparts engaged in direct enemy combat. Their weapons included spears, bows, and swords.
The tribes of Central Asia, including the Huns, Turks, and Mongols, often used light cavalry for similar missions.
It is important to note that practices, weapons, and so on varied depending on historical period and region.
The cover image is from Dover Pictorial Archive. The cover font is Adobe ITC Garamond. The text font is Linotype Birka; the heading font is Adobe Myriad Condensed; and the code font is LucasFont’s TheSansMonoCondensed.
Table of Contents
Inside Cyber Warfare
Foreword
Preface
How This Book Came to Be
Conventions Used in This Book
Attributions and Permissions
How to Contact Us
Safari® Books Online
Acknowledgments
1. Assessing the Problem
The Complex Domain of Cyberspace
Cyber Warfare in the 20th and 21st Centuries
China
Israel
Russia
The Second Russian-Chechen War (1997–2001)
The Estonian cyber attacks (2007)
The Russia-Georgia War (2008)
Iran
North Korea
Cyber Espionage
Titan Rain
Cyber Crime
Future Threats
Increasing Awareness
Critical Infrastructure
The Conficker Worm: The Cyber Equivalent of an Extinction Event?
Africa: The Future Home of the World’s Largest Botnet?
The Way Forward
2. The Rise of the Nonstate Hacker
The StopGeorgia.ru Project Forum
Counter-Surveillance Measures in Place
The Russian Information War
The Foundation for Effective Politics’ War on the Net (Day One)
The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead
Impact
Overview of Perpetrators
Motivations
Hackers’ Profiles
Team Evil
Cold Zero (aka Cold Z3ro or Roma Burner)
Team Hell (aka Team H3ll or Team Heil)
Agd_Scorp/Peace Crew (aka Agd_Scorp/Terrorist