Skip to content

Next War Zone Confronting the Global Threat of Cyberterrorism

Best in textbook rentals since 2012!

ISBN-10: 0806524138

ISBN-13: 9780806524139

Edition: 2003

Authors: James F. Dunnigan

List price: $24.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Military expert James F. Dunnigan sounds the alarm on what could be the world's next surprise attack. He explains what cyberwar really is, what could happen, and how to protect yourself from becoming a pawn in a dangerous game.
Customers also bought

Book details

List price: $24.95
Copyright year: 2003
Publisher: Kensington Publishing Corporation
Publication date: 10/1/2002
Binding: Hardcover
Pages: 256
Size: 6.00" wide x 9.00" long x 1.00" tall
Weight: 1.232
Language: English

James F. Dunnigan has written more than 100 books and articles about warfare and diplomacy. A resident of New York City, he is a military analyst for MSNBC and has been a consultant to the State Department, the CIA, and the Army War College.

Foreword
Acknowledgments
Cyberwar and You
Technical Terms You Might Not Recognize in This Chapter
Good News, Bad News
Bringing the War Home
Let's Just Do It
The Bad Guys and What They Do
Cyberwar
The Major Unknown
The Most Likely Cyberwars
The Usual Suspects
What Can Be Done?
Where Cyberwar Came From
Technical Terms You Might Not Recognize in This Chapter
Alexander the Cyberwarrior
Khan of the Information Warriors
Edward the Great Communicator
Electric Warfare
Where the World Wide Web, and All Our Problems, Came From
The Dark Side
The Internet: Built to Be Nuked
Technical Terms You Might Not Recognize in This Chapter
Packet Switching Takes You Anywhere
DNS and the Root Servers
E-mail Takes Over ARPANET
Saved by an Open-Source Apache
Insecurity Included
Arpanet Breaks Free
The World Wide Web Tidal Wave
Cyberwars Past
Technical Terms You Might Not Recognize in This Chapter
The Largest Cyberwar Ever
Cyberwar Case Studies
Kosovo Capers
Electronic Warfare over the Balkans
The Keys Report
The Balkans Syndrome
The Y2K Scare
Code Red from China
Cyberwars Present and Future
Technical Terms You Might Not Recognize in This Chapter
Cyberwar Is Already Here
Cyber Attacks on the U.S. Defense Department
Going After the Big Guy
The Internet Goes to War
The Threat from the East
Doomsday Via the Internet
Electronic Guerillas from China
Iraq's Starving Cyberwarriors
Loose Links Sink Ships
National Infrastructure Assurance Council (NIAC)
Patriotic Hackers
Afghanistan
Al Qaeda Web Assets Attacked Before the War
Run Over by the Internet
Information War
Technical Terms You Might Not Recognize in This Chapter
Information Is Fundamental
Deceptions
Psychotic Victims of Cyberwar
Information War and PAO Competence
Information War for More Money
Reading Other People's Mail
Internal Information War
The Television Information War
MTV Generation
News from Far Away
It Pays to Advertise
The Spin Game
Chasing Headlines
Rumor War
Virtual Peacekeeping
The Future of Information War
Hackers, Sysadmins, and Codewarriors
Technical Terms You Might Not Recognize in This Chapter
Who Are the Hackers, Sysadmins, and Codewarriors?
NSA No Geek Magnet
Clueless Criminal Management
Tell It to the Judge
Reserve Cyberwarriors
Simulated Media
The Dark Side of Military Web Use
Hacking Without a Computer
The Cyberwarriors
Technical Terms You Might Not Recognize in This Chapter
Will Cyberwar Work?
Information War Then and Now
The Gulf War, the First Information War
Peacetime Information War
The United States Cyberwar Command
Cybewarfare Units Around the World
Mysterious China Catches Up with Its Past
The FBI and the National Infrastructure Protection Center (NIPC)
The Missing Cyberwarriors
Web Risk Assessment Team
The Cybermilitia
What Cyberwar Will Look Like
The Cyberwarrior's Weapons and Tools
Technical Terms You Might Not Recognize in This Chapter
The Cyberwarrior's Toolbox
Tools and Techniques of SPAA (Scan, Probe, Analyze, Attack)
SIPRNET and the Threat
Data Mining, OLAP, and Brushing
Wiretaps and Information Warfare
The Faster Cyberwarrior Wins
The Battlefield Internet
Full Color and Guided by Satellite
AirNet and Information from Above
Military Chat
Missile Masters on the Battlefield Internet
The Enemy: Black Hats, Script Kiddies, and Crackers
Technical Terms You Might Not Recognize in This Chapter
Black-Hat Hackers
Patterns of Attack
Black Hats and Honey Pots
Cybercrimes and Cyberterrorism
Cybercriminals
Common Internet Fraud Schemes
The Year of the DDOS Zombie
The Feds Get on the Case
Rampaging Vulnerabilities
The Dark Side's Superhighway
Spare a Few Viruses?
Microsoft the Patriot
Surviving Cyberwar
Malicious Microsoft
The Invisible Internet
Playing Defense
Sneaky Spiders
Adware
Ancient Hardware
New Solutions
Important Things to Do
For Cable Modem or DSL Users
Unix/Linux Users
Don't Worry, Be Happy
Appendices
U.S. Air Force and Cyberwarfare
NIPC (National Infrastructure Protection Center)
Glossary
Index