Preface -- Media Massage |
|
1 | (20) |
|
|
3 | (1) |
|
The Public Relations Industry |
|
|
4 | (5) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (10) |
|
Prologue -- The Wonder of It All |
|
|
17 | (4) |
|
|
|
Chapter 1 A Backdrop of Metaphors |
|
|
21 | (48) |
|
|
22 | (1) |
|
|
23 | (1) |
|
An Electronic Pearl Harbor |
|
|
24 | (4) |
|
|
28 | (2) |
|
The Hiroshima of Cyberwar |
|
|
30 | (1) |
|
|
31 | (2) |
|
|
33 | (2) |
|
|
35 | (7) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
38 | (2) |
|
The Question of Offensive Operations |
|
|
40 | (2) |
|
|
42 | (13) |
|
|
44 | (1) |
|
|
45 | (2) |
|
Black Hat or Just Old Hat? |
|
|
47 | (1) |
|
Stuxnet as a Joint Venture |
|
|
48 | (1) |
|
|
49 | (1) |
|
DuQu: The Son of Stuxnet? |
|
|
50 | (1) |
|
|
51 | (1) |
|
Flame, Gauss, and miniFlame |
|
|
52 | (3) |
|
All Roads Lead to Uncle Sam |
|
|
55 | (1) |
|
|
55 | (14) |
|
Presidential Policy Directive 20 |
|
|
56 | (1) |
|
Hacking Foreign Targets for Years |
|
|
57 | (1) |
|
Oz the Great and Powerful |
|
|
58 | (11) |
|
Chapter 2 Our Frenemy in Asia |
|
|
69 | (20) |
|
|
70 | (2) |
|
|
72 | (1) |
|
The Internet's Frontier Town |
|
|
73 | (3) |
|
Opposing Models for Reform |
|
|
76 | (2) |
|
The Extent of Chinas Capabilities |
|
|
78 | (1) |
|
|
79 | (1) |
|
Both Sides Keep the Other in Business |
|
|
80 | (2) |
|
The #1 Threat to Economic Security |
|
|
82 | (7) |
|
Chapter 3 Cyberwar as a Misdiagnosis |
|
|
89 | (16) |
|
|
92 | (7) |
|
|
93 | (2) |
|
|
95 | (3) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (6) |
|
Part II A Series of Unfortunate Events |
|
|
|
|
105 | (30) |
|
|
105 | (6) |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
108 | (3) |
|
|
111 | (14) |
|
|
111 | (2) |
|
The Heartland Payment Systems Breach |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
The Return of the Analyzer |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Operation Trident Tribunal |
|
|
124 | (1) |
|
|
125 | (5) |
|
|
126 | (4) |
|
|
130 | (5) |
|
|
135 | (36) |
|
|
135 | (1) |
|
|
136 | (2) |
|
Operation Byzantine Hades |
|
|
138 | (2) |
|
|
140 | (2) |
|
Joint Strike Fighter Breach |
|
|
142 | (1) |
|
|
142 | (4) |
|
|
146 | (2) |
|
|
148 | (1) |
|
|
149 | (3) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Targeting Certificate Authorities |
|
|
154 | (6) |
|
|
155 | (2) |
|
|
157 | (2) |
|
Multistage Attacks Emerge |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (10) |
|
Chapter 6 The Scope of U.S. Espionage |
|
|
171 | (48) |
|
|
176 | (2) |
|
|
178 | (4) |
|
|
182 | (5) |
|
Apologists and Opposing Views |
|
|
187 | (2) |
|
|
189 | (2) |
|
The Malware Industrial Complex |
|
|
191 | (10) |
|
Mass Surveillance Systems |
|
|
191 | (4) |
|
Exploits and Arms Dealers |
|
|
195 | (5) |
|
Falling Barriers to Entry |
|
|
200 | (1) |
|
|
201 | (4) |
|
|
203 | (2) |
|
|
205 | (1) |
|
But Some Groups Spy More Than Others |
|
|
206 | (13) |
|
Chapter 7 The Infrastructure |
|
|
219 | (28) |
|
|
220 | (4) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (4) |
|
|
228 | (1) |
|
|
228 | (2) |
|
The Internet: Denial of Service Attacks |
|
|
230 | (10) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
South Korea and the United States |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (3) |
|
|
238 | (2) |
|
The Internet: Manipulating Traffic |
|
|
240 | (7) |
|
Chapter 8 Threat Inflation |
|
|
247 | (12) |
|
|
248 | (5) |
|
Moving Towards Cyber-Security |
|
|
253 | (6) |
|
Part III The Futility of Offensive Solutions |
|
|
|
Chapter 9 The Quandary of Attribution |
|
|
259 | (24) |
|
Achieving Anonymity Online |
|
|
260 | (11) |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
Government-Funded Efforts |
|
|
265 | (4) |
|
|
269 | (1) |
|
Attribution for Everyone... But The Inner Party |
|
|
270 | (1) |
|
|
271 | (4) |
|
|
272 | (1) |
|
|
273 | (2) |
|
|
275 | (2) |
|
|
277 | (6) |
|
Chapter 10 Shades of Orwell |
|
|
283 | (64) |
|
The Golden Age of Surveillance |
|
|
284 | (14) |
|
|
285 | (1) |
|
FISA Amendments Act of 2008 |
|
|
286 | (3) |
|
|
289 | (1) |
|
|
290 | (2) |
|
An Aside: Files on Everyone |
|
|
292 | (1) |
|
|
292 | (3) |
|
|
295 | (2) |
|
The NSA's MUSCULAR Project |
|
|
297 | (1) |
|
|
298 | (4) |
|
|
299 | (2) |
|
The DHS Monitors Social Media |
|
|
301 | (1) |
|
|
302 | (13) |
|
|
306 | (1) |
|
|
307 | (1) |
|
Spying as a Business Model |
|
|
308 | (2) |
|
The Public-Private Partnership |
|
|
310 | (5) |
|
|
315 | (32) |
|
Questioning the Official Narrative |
|
|
320 | (3) |
|
Watching Americas Adversaries |
|
|
323 | (2) |
|
|
325 | (2) |
|
|
327 | (20) |
|
Part IV The Road to Cyber-Security |
|
|
|
Chapter 11 The Origins of Cyber-Insecurity |
|
|
347 | (28) |
|
|
347 | (1) |
|
|
348 | (5) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (2) |
|
|
353 | (9) |
|
Critical Bugs Are Pedestrian |
|
|
353 | (3) |
|
The Presumption of Security |
|
|
356 | (3) |
|
|
359 | (2) |
|
Inadequate Endpoint Security |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (4) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (9) |
|
Chapter 12 Cyber -Security for the 99% |
|
|
375 | (32) |
|
Building Resilient Software |
|
|
375 | (15) |
|
Prevention versus Response |
|
|
376 | (1) |
|
|
376 | (3) |
|
|
379 | (1) |
|
Sandboxes and Virtual Machines |
|
|
380 | (2) |
|
|
382 | (5) |
|
|
387 | (2) |
|
|
389 | (1) |
|
International Cooperation |
|
|
390 | (2) |
|
|
392 | (5) |
|
|
394 | (1) |
|
|
395 | (2) |
|
|
397 | (3) |
|
|
399 | (1) |
|
|
400 | (7) |
|
|
407 | (23) |
|
The Hazards of a Misdiagnosis |
|
|
408 | (1) |
|
|
409 | (2) |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (3) |
|
|
418 | (1) |
|
|
419 | (2) |
|
Root Causes of Cyber-Insecurity |
|
|
421 | (1) |
|
Cyber-Security for the 1% |
|
|
422 | (2) |
|
Cyber-Security for the 99% |
|
|
424 | (6) |
Index |
|
430 | |