| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
| |
Cyberwar and You | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Good News, Bad News | |
| |
| |
Bringing the War Home | |
| |
| |
Let's Just Do It | |
| |
| |
The Bad Guys and What They Do | |
| |
| |
Cyberwar | |
| |
| |
The Major Unknown | |
| |
| |
The Most Likely Cyberwars | |
| |
| |
The Usual Suspects | |
| |
| |
What Can Be Done? | |
| |
| |
| |
Where Cyberwar Came From | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Alexander the Cyberwarrior | |
| |
| |
Khan of the Information Warriors | |
| |
| |
Edward the Great Communicator | |
| |
| |
Electric Warfare | |
| |
| |
Where the World Wide Web, and All Our Problems, Came From | |
| |
| |
The Dark Side | |
| |
| |
| |
The Internet: Built to Be Nuked | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Packet Switching Takes You Anywhere | |
| |
| |
DNS and the Root Servers | |
| |
| |
E-mail Takes Over ARPANET | |
| |
| |
Saved by an Open-Source Apache | |
| |
| |
Insecurity Included | |
| |
| |
Arpanet Breaks Free | |
| |
| |
The World Wide Web Tidal Wave | |
| |
| |
| |
Cyberwars Past | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
The Largest Cyberwar Ever | |
| |
| |
Cyberwar Case Studies | |
| |
| |
Kosovo Capers | |
| |
| |
Electronic Warfare over the Balkans | |
| |
| |
The Keys Report | |
| |
| |
The Balkans Syndrome | |
| |
| |
The Y2K Scare | |
| |
| |
Code Red from China | |
| |
| |
| |
Cyberwars Present and Future | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Cyberwar Is Already Here | |
| |
| |
Cyber Attacks on the U.S. Defense Department | |
| |
| |
Going After the Big Guy | |
| |
| |
The Internet Goes to War | |
| |
| |
The Threat from the East | |
| |
| |
Doomsday Via the Internet | |
| |
| |
Electronic Guerillas from China | |
| |
| |
Iraq's Starving Cyberwarriors | |
| |
| |
Loose Links Sink Ships | |
| |
| |
National Infrastructure Assurance Council (NIAC) | |
| |
| |
Patriotic Hackers | |
| |
| |
Afghanistan | |
| |
| |
Al Qaeda Web Assets Attacked Before the War | |
| |
| |
Run Over by the Internet | |
| |
| |
| |
Information War | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Information Is Fundamental | |
| |
| |
Deceptions | |
| |
| |
Psychotic Victims of Cyberwar | |
| |
| |
Information War and PAO Competence | |
| |
| |
Information War for More Money | |
| |
| |
Reading Other People's Mail | |
| |
| |
Internal Information War | |
| |
| |
The Television Information War | |
| |
| |
MTV Generation | |
| |
| |
News from Far Away | |
| |
| |
It Pays to Advertise | |
| |
| |
The Spin Game | |
| |
| |
Chasing Headlines | |
| |
| |
Rumor War | |
| |
| |
Virtual Peacekeeping | |
| |
| |
The Future of Information War | |
| |
| |
| |
Hackers, Sysadmins, and Codewarriors | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Who Are the Hackers, Sysadmins, and Codewarriors? | |
| |
| |
NSA No Geek Magnet | |
| |
| |
Clueless Criminal Management | |
| |
| |
Tell It to the Judge | |
| |
| |
Reserve Cyberwarriors | |
| |
| |
Simulated Media | |
| |
| |
The Dark Side of Military Web Use | |
| |
| |
Hacking Without a Computer | |
| |
| |
| |
The Cyberwarriors | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Will Cyberwar Work? | |
| |
| |
Information War Then and Now | |
| |
| |
The Gulf War, the First Information War | |
| |
| |
Peacetime Information War | |
| |
| |
The United States Cyberwar Command | |
| |
| |
Cybewarfare Units Around the World | |
| |
| |
Mysterious China Catches Up with Its Past | |
| |
| |
The FBI and the National Infrastructure Protection Center (NIPC) | |
| |
| |
The Missing Cyberwarriors | |
| |
| |
Web Risk Assessment Team | |
| |
| |
The Cybermilitia | |
| |
| |
What Cyberwar Will Look Like | |
| |
| |
| |
The Cyberwarrior's Weapons and Tools | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
The Cyberwarrior's Toolbox | |
| |
| |
Tools and Techniques of SPAA (Scan, Probe, Analyze, Attack) | |
| |
| |
SIPRNET and the Threat | |
| |
| |
Data Mining, OLAP, and Brushing | |
| |
| |
Wiretaps and Information Warfare | |
| |
| |
The Faster Cyberwarrior Wins | |
| |
| |
The Battlefield Internet | |
| |
| |
Full Color and Guided by Satellite | |
| |
| |
AirNet and Information from Above | |
| |
| |
Military Chat | |
| |
| |
Missile Masters on the Battlefield Internet | |
| |
| |
| |
The Enemy: Black Hats, Script Kiddies, and Crackers | |
| |
| |
Technical Terms You Might Not Recognize in This Chapter | |
| |
| |
Black-Hat Hackers | |
| |
| |
Patterns of Attack | |
| |
| |
Black Hats and Honey Pots | |
| |
| |
Cybercrimes and Cyberterrorism | |
| |
| |
Cybercriminals | |
| |
| |
Common Internet Fraud Schemes | |
| |
| |
The Year of the DDOS Zombie | |
| |
| |
The Feds Get on the Case | |
| |
| |
Rampaging Vulnerabilities | |
| |
| |
The Dark Side's Superhighway | |
| |
| |
Spare a Few Viruses? | |
| |
| |
Microsoft the Patriot | |
| |
| |
| |
Surviving Cyberwar | |
| |
| |
Malicious Microsoft | |
| |
| |
The Invisible Internet | |
| |
| |
Playing Defense | |
| |
| |
Sneaky Spiders | |
| |
| |
Adware | |
| |
| |
Ancient Hardware | |
| |
| |
New Solutions | |
| |
| |
Important Things to Do | |
| |
| |
For Cable Modem or DSL Users | |
| |
| |
Unix/Linux Users | |
| |
| |
Don't Worry, Be Happy | |
| |
| |
Appendices | |
| |
| |
U.S. Air Force and Cyberwarfare | |
| |
| |
NIPC (National Infrastructure Protection Center) | |
| |
| |
Glossary | |
| |
| |
Index | |