Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [184]

By Root 1264 0
the Future Will Be Information Wars”

website defacements, Website defacements

Whackerz-Pakistan Cr3w, Pakistani Hackers and Facebook

WHOIS, Using WHOIS, Caveats to Using WHOIS, Caveats to Using WHOIS

limitations for investigative purposes, Caveats to Using WHOIS

Williams, Evan, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences

World Wide Web and complexity theory, Conducting Operations in the Cyber-Space-Time Continuum

World Wide Web War I, China

worms and RBN, Organized Crime in Cyberspace

www.102fm.co.il, Impact

X

XX_Hacker_XX, Nimr al-Iraq (“The Tiger of Iraq”) and XX_Hacker_XX

Y

Yakunin, Vladimir, New Laws and Amendments

Yevloyev, Magomed, Assessing the Problem, Ingushetia Conflict, August 2009

Ynetnews.com, Impact

Z

zero-day exploits, Cyber: The Chaotic Domain, Research is the key to offensive capabilities, Protecting against 0day exploits

defending against, Protecting against 0day exploits

Zharov, Maksim, The Foundation for Effective Politics’ War on the Net (Day One), The Foundation for Effective Politics (FEP)

ZhZh (Zhivoy Zhurnal), The Foundation for Effective Politics’ War on the Net (Day One)

About the Author


Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, columnist for Symantec's Security Focus, and author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.

Mr. Carr is the Principal Investigator for Project Grey Goose, an Open Source intelligence investigation into the Russian cyber attacks on Georgia in August, 2008. The Grey Goose Phase I and Phase II reports have been widely read and well-received throughout the Intelligence, Defense, and Law Enforcement agencies of Western governments.

His work has been quoted in The New York Times, The Washington Post, The Guardian, BusinessWeek, Parameters, and Wired.

Colophon


The image on the cover of Inside Cyber Warfare is of light cavalry, as evidenced by the lack of armor adorning the soldier and his horse. During Roman-Germanic wars, the duties of reconnaissance, screening, and raiding fell on the light cavalry, while their more heavily armored counterparts engaged in direct enemy combat. Their weapons included spears, bows, and swords.

The tribes of Central Asia, including the Huns, Turks, and Mongols, often used light cavalry for similar missions.

It is important to note that practices, weapons, and so on varied depending on historical period and region.

The cover image is from Dover Pictorial Archive. The cover font is Adobe ITC Garamond. The text font is Linotype Birka; the heading font is Adobe Myriad Condensed; and the code font is LucasFont’s TheSansMonoCondensed.

Table of Contents

Inside Cyber Warfare

Foreword

Preface

How This Book Came to Be

Conventions Used in This Book

Attributions and Permissions

How to Contact Us

Safari® Books Online

Acknowledgments

1. Assessing the Problem

The Complex Domain of Cyberspace

Cyber Warfare in the 20th and 21st Centuries

China

Israel

Russia

The Second Russian-Chechen War (1997–2001)

The Estonian cyber attacks (2007)

The Russia-Georgia War (2008)

Iran

North Korea

Cyber Espionage

Titan Rain

Cyber Crime

Future Threats

Increasing Awareness

Critical Infrastructure

The Conficker Worm: The Cyber Equivalent of an Extinction Event?

Africa: The Future Home of the World’s Largest Botnet?

The Way Forward

2. The Rise of the Nonstate Hacker

The StopGeorgia.ru Project Forum

Counter-Surveillance Measures in Place

The Russian Information War

The Foundation for Effective Politics’ War on the Net (Day One)

The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead

Impact

Overview of Perpetrators

Motivations

Hackers’ Profiles

Team Evil

Cold Zero (aka Cold Z3ro or Roma Burner)

Team Hell (aka Team H3ll or Team Heil)

Agd_Scorp/Peace Crew (aka Agd_Scorp/Terrorist

Return Main Page Previous Page Next Page

®Online Book Reader