Atjaunināt sīkdatņu piekrišanu

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex [Mīkstie vāki]

  • Formāts: Paperback / softback, 448 pages, height x width x depth: 215x139x25 mm, weight: 412 g, Illustrations
  • Izdošanas datums: 17-Apr-2014
  • Izdevniecība: Trine Day
  • ISBN-10: 1937584801
  • ISBN-13: 9781937584801
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 30,00 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 448 pages, height x width x depth: 215x139x25 mm, weight: 412 g, Illustrations
  • Izdošanas datums: 17-Apr-2014
  • Izdevniecība: Trine Day
  • ISBN-10: 1937584801
  • ISBN-13: 9781937584801
Citas grāmatas par šo tēmu:

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion—much like the run-up to the Gulf War or the global war on terror—this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, Behold a Pale Farce covers topics—including cybercrime; modern espionage; mass-surveillance systems; and the threats facing infrastructure targets such as the Federal Reserve, the stock exchange, and telecommunications—in a way that provides objective analysis rather than advocacy. This book is a must-read for anyone concerned with the recent emergence of Orwellian tools of mass interception that have developed under the guise of national security.

Recenzijas

"Bill Blunden and Violet Cheung have produced something of a first on the subject, a comprehensive book on it that isn't like all previous works on the matter. The genre of cyberwar books can be explained in less than half a dozen words [ ...] Blunden and Cheung's is the one to read. Unlike the rest of our so-called 'books' on cyberwar (take this best-selling example), Behold a Pale Farce [ ...], won't badly date if another Edward Snowden comes along. It is a true chronicle, a slice, of our technological history." -- George Smith, Sitrep, globalsecurity.org

Preface -- Media Massage 1(20)
First Hand Experience
3(1)
The Public Relations Industry
4(5)
Behold a Pale Farce
9(1)
Organization
10(1)
Acknowledgments
11(10)
Prologue -- The Wonder of It All
17(4)
Part I Rampant Hyperbole
Chapter 1 A Backdrop of Metaphors
21(48)
Never Mind: False Alarm
22(1)
The Madness of Crowds
23(1)
An Electronic Pearl Harbor
24(4)
A Cyber-Katrina
28(2)
The Hiroshima of Cyberwar
30(1)
A Cyber 9/11
31(2)
Dissenting Voices
33(2)
The Executive Responds
35(7)
CNCI -- Part 1
35(2)
CNCI Reloaded
37(1)
Cybercom
38(2)
The Question of Offensive Operations
40(2)
Stuxnet
42(13)
A Picture Emerges
44(1)
Rumors Abound
45(2)
Black Hat or Just Old Hat?
47(1)
Stuxnet as a Joint Venture
48(1)
Impact on Iran's Program
49(1)
DuQu: The Son of Stuxnet?
50(1)
Platform Tilded
51(1)
Flame, Gauss, and miniFlame
52(3)
All Roads Lead to Uncle Sam
55(1)
Plan X
55(14)
Presidential Policy Directive 20
56(1)
Hacking Foreign Targets for Years
57(1)
Oz the Great and Powerful
58(11)
Chapter 2 Our Frenemy in Asia
69(20)
A Plurality of Actors
70(2)
Rule of Law Breaks Down
72(1)
The Internet's Frontier Town
73(3)
Opposing Models for Reform
76(2)
The Extent of Chinas Capabilities
78(1)
Joined at the Hip
79(1)
Both Sides Keep the Other in Business
80(2)
The #1 Threat to Economic Security
82(7)
Chapter 3 Cyberwar as a Misdiagnosis
89(16)
Dialing 911
92(7)
War
93(2)
Terrorism
95(3)
Espionage
98(1)
Crime
99(1)
Looking Ahead
99(6)
Part II A Series of Unfortunate Events
Chapter 4 Cybercrime
105(30)
The Ecosystem
105(6)
Breaking In
106(2)
Fencing the Goods
108(1)
Evading Capture
108(3)
A Snapshot of Cybercrime
111(14)
The TJX Hack
111(2)
The Heartland Payment Systems Breach
113(1)
The DarkMarket Sting
114(1)
Torpig Takedown
115(1)
The RBS WorldPay Attack
116(1)
The Return of the Analyzer
117(1)
The Ballad of Max Butler
118(1)
Operation Trident Breach
119(1)
From China with Love
120(1)
Sony Under Siege
121(1)
Citigroup Comes Clean
122(1)
The FIS Breach
123(1)
Operation Trident Tribunal
124(1)
The Big Picture
125(5)
Loss Statistics
126(4)
The Punch Line
130(5)
Chapter 5 Espionage
135(36)
Moonlight Maze
135(1)
Titan Rain
136(2)
Operation Byzantine Hades
138(2)
GhostNet
140(2)
Joint Strike Fighter Breach
142(1)
Operation Aurora
142(4)
Shadows in the Cloud
146(2)
Night Dragon
148(1)
RSA and SecurID
149(3)
Operation Shady RAT
152(1)
The Nitro Attacks
153(1)
Targeting Certificate Authorities
154(6)
Comodogate
155(2)
Operation Black Tulip
157(2)
Multistage Attacks Emerge
159(1)
Operation Red October
160(1)
Patterns Emerge
161(10)
Chapter 6 The Scope of U.S. Espionage
171(48)
Booby-Trapped Chips
176(2)
U.S. Subversion Programs
178(4)
U.S. Economic Espionage
182(5)
Apologists and Opposing Views
187(2)
American Exceptionalism
189(2)
The Malware Industrial Complex
191(10)
Mass Surveillance Systems
191(4)
Exploits and Arms Dealers
195(5)
Falling Barriers to Entry
200(1)
Independent Operators
201(4)
History Repeats Itself
203(2)
Spies Abound
205(1)
But Some Groups Spy More Than Others
206(13)
Chapter 7 The Infrastructure
219(28)
The Financial System
220(4)
The Stock Exchanges
221(1)
The Federal Reserve
222(1)
Serious Threats
223(1)
The Power Grid
224(4)
The Telecoms
228(1)
Aerospace
228(2)
The Internet: Denial of Service Attacks
230(10)
Estonia
230(1)
Georgia
231(1)
Kyrgyzstan
231(1)
South Korea and the United States
232(1)
South Korea, Again
233(1)
McAfee
234(1)
Commercial Bank Attacks
234(1)
Spamhaus
235(3)
A Nuisance at Best
238(2)
The Internet: Manipulating Traffic
240(7)
Chapter 8 Threat Inflation
247(12)
Conflicts of Interest
248(5)
Moving Towards Cyber-Security
253(6)
Part III The Futility of Offensive Solutions
Chapter 9 The Quandary of Attribution
259(24)
Achieving Anonymity Online
260(11)
Do-It-Yourself Anonymity
261(2)
Browser Profiling
263(1)
Defense in Depth
264(1)
Retail Products
264(1)
Government-Funded Efforts
265(4)
The Origins of Tor
269(1)
Attribution for Everyone... But The Inner Party
270(1)
The Folly of Attribution
271(4)
Anti-Forensics
272(1)
False Flag Operations
273(2)
Deterrence
275(2)
Arms Control Treaties
277(6)
Chapter 10 Shades of Orwell
283(64)
The Golden Age of Surveillance
284(14)
Warrantless Wiretapping
285(1)
FISA Amendments Act of 2008
286(3)
Violations Occur
289(1)
Mass Interception
290(2)
An Aside: Files on Everyone
292(1)
Verizon FISC Order
292(3)
PRISM
295(2)
The NSA's MUSCULAR Project
297(1)
Opting Into Surveillance
298(4)
Vengeful Librarians
299(2)
The DHS Monitors Social Media
301(1)
Corporate Compliance
302(13)
CISPA
306(1)
The Hemisphere Project
307(1)
Spying as a Business Model
308(2)
The Public-Private Partnership
310(5)
A Global Panopticon
315(32)
Questioning the Official Narrative
320(3)
Watching Americas Adversaries
323(2)
By The Numbers
325(2)
Coda: Extorting Privacy
327(20)
Part IV The Road to Cyber-Security
Chapter 11 The Origins of Cyber-Insecurity
347(28)
A Layered Perspective
347(1)
Exciting Causes
348(5)
Human Factors
349(1)
Misconfiguration
350(1)
Buggy Software
351(2)
The Software Depression
353(9)
Critical Bugs Are Pedestrian
353(3)
The Presumption of Security
356(3)
Assurance is Lacking
359(2)
Inadequate Endpoint Security
361(1)
Predisposing Causes
362(1)
Remote Causes
362(4)
Market Forces
363(1)
Negative Externalities
364(1)
A Word on Bug Bounties
365(1)
Security for the 1%
366(9)
Chapter 12 Cyber -Security for the 99%
375(32)
Building Resilient Software
375(15)
Prevention versus Response
376(1)
Compartmentalization
376(3)
Poor Man's Tactics
379(1)
Sandboxes and Virtual Machines
380(2)
Formal Verification
382(5)
Echoes of Ken Thompson
387(2)
Treating the Symptoms
389(1)
International Cooperation
390(2)
Managing Externalities
392(5)
Regulation
394(1)
Liability
395(2)
Catch-22
397(3)
Other Barriers to Change
399(1)
Strength in Numbers
400(7)
Epilogue
407(23)
The Hazards of a Misdiagnosis
408(1)
Securitization In-Depth
409(2)
Threat Inflation
411(3)
The Folly of Deterrence
414(1)
In Search of Enemies
414(1)
American Hypocrisy
415(3)
Subverting Attribution
418(1)
Turning to Big Brother
419(2)
Root Causes of Cyber-Insecurity
421(1)
Cyber-Security for the 1%
422(2)
Cyber-Security for the 99%
424(6)
Index 430
Bill Blunden is an independent investigator whose current areas of inquiry include information security, antiforensics, and institutional analysis. He is the author of several books, including Offshoring IT: The Good, the Bad, and the Ugly and The Rootkit Arsenal. Violet Cheung is a professor of psychology at the University of San Francisco. Her research addresses self-control, aggression, and war. They both live in San Francisco.