Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Inside cyber warfare : mapping the cyber underworld
Carr J., O’Reilly Media, Inc., Sebastopol, CA, 2009. 240 pp. Type: Book (978-0-596802-15-8)
Date Reviewed: Jun 3 2010

Most books on cyber warfare look at the subject area from a purely technical perspective. This book’s coverage of the macro issues associated with cyber war--including international law, involvement of organized crime, and state machinery--sets it apart from others in the field.

Chapter 1 provides an introduction to the problem of warfare in cyberspace by referencing recent incidents involving nonstate hackers from countries such as China, Russia, Israel, and Iran. Chapter 2 looks at some of these well-know hackers and follows up with a discussion on whether these nonstate actors are protected within a nation’s legal system. Chapter 3 discusses the legal status of cyber warfare and existing thoughts on how cyber warfare can be governed by the existing laws of armed conflict. The next chapter covers various issues associated with this matter in a detailed, in-depth way. Placing specific emphasis on the use of active defense to thwart cyber attacks, its strength lies in the strong analysis of cyber war scenarios. It tackles the contentious issue of nonstate actors and the need to impute state responsibility for their acts.

Chapter 5 discusses the investigation and analysis performed by Project Grey Goose--in which the author participated--on two cyber attacks: the attacks against US and South Korean government Web sites in 2009, and the LiveJournal and Twitter distributed denial-of-service (DDoS) attacks in August 2009. It also proposes a new approach to conducting cyber intelligence, taking into account unique issues associated with cyberspace and cyber warfare. Chapter 6 looks at hackers’ use of social Web tools, such as Twitter, Facebook, and MySpace, to collect personal information about potential attack targets, and how these tools are then used to mount targeted attacks. Chapter 7 explains how the process of following the money trail created by arranging the logistics of launching an attack can be used to track down the culprits, while chapter 8 discusses the involvement of organized crime in cyber warfare, with an emphasis on Russian organized crime.

Chapter 9 takes a quick look at some basic network forensics tools available to investigators. Subsequent chapters cover malware, foreign approaches, an early warning model, and advice to policy makers.

The book has some failings. While it covers good ground, it falls short of a scholarly work, mainly due to the unequal depth of analysis of the various issues.

Reviewer:  Srijith Nair Review #: CR138068 (1105-0495)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Use/ Abuse Of Power (K.4.1 ... )
 
 
General (C.2.0 )
 
 
Public Policy Issues (K.4.1 )
 
 
Security and Protection (K.6.5 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy