Text
The next war zone: confronting the global threat of of cyber terrorism
THE NEXT WAR ZONE
CONFRONTING THE GLOBAL THREAT OF CYBERTERRORISM
JAMES F. DUNNIGAN
CHAPTER 1: Cyberwar and You 1
Technical Terms You Might Not Recognize in This Chapter 1
Good News, Bad News 2
Bringing the War Home 5
Let’s Just Do It 6
The Bad Guys and What They Do 7
Cyberwar 10
The Major Unknown 13
The Most Likely Cyberwars 14
The Usual Suspects 15
What Can Be Done? 17
CHAPTER 2: Where Cyberwar Came From 19
Technical Terms You Might Not Recognize in This Chapter 19
Alexander the Cyberwarrior 21
Khan of the Information Warriors 26
Edward the Great Communicator 27
Electric Warfare 29
Where the World Wide Web, and All Our Problems, Came From 31
The Dark Side 38
CHAPTER 3: The Internet: Built to Be Nuked 45
Technical Terms You Might Not Recognize in This Chapter 45
Packet Switching Takes You Anywhere 46
DNS and the Root Servers 48
E-mail Takes Over ARPANET 48
Saved by an Open-Source Apache 49
Insecurity Included 51
ARPANET Breaks Free 54
The World Wide Web Tidal Wave 57
CHAPTER 4: Cyberwars Past 60
Technical Terms You Might Not Recognize in This Chapter 60
The Largest Cyberwar Ever 61
Cyberwar Case Studies 68
Kosovo Capers 70
Electronic Warfare over the Balkans 72
The Keys Report 72
The Balkans Syndrome 74
The Y2K Scare 76
Code Red from China 79
CHAPTER 5: Cyberwars Present and Future 82
Technical Terms You Might Not Recognize in This Chapter 82
Cyberwar Is Already Here 83
Cyber Attacks on the U.S. Defense Department 84
Going After the Big Guy 87
The Internet Goes to War 89
The Threat from the East 90
Doomsday Via the Internet 91
Electronic Guerillas from China 91
Iraq’s Starving Cyberwarriors 94
Loose Links Sink Ships 95
National Infrastructure Assurance Council (NIAC) 96
Patriotic Hackers 97
Afghanistan 98
Al Qaeda Web Assets Attacked Before the War 99
Run Over by the Internet 100
CHAPTER 6: Information War 103
Technical Terms You Might Not Recognize in This Chapter 103
Information Is Fundamental 104
Deceptions 106
Psychotic Victims of Cyberwar 108
Information War and PAO Competence 110
Information War for More Money 110
Reading Other People’s Mail 111
Internal Information War 114
The Television Information War 115
MTV Generation 117
News from Far Away 118
It Pays to Advertise 120
The Spin Game 120
Chasing Headlines 122
Rumor War 123
Virtual Peacekeeping 125
The Future of Information War 127
CHAPTER 7: Hackers, Sysadmins and Codewarriors 131
Technical Terms You Might Not Recognize in This Chapter 131
Who Are the Hackers, Sysadmins, and Codewarriors? 132
NSA No Geek Magnet 136
Clueless Criminal Management 137
Tell It to the Judge 138
Reserve Cyberwarriors 139
Simulated Media 140
The Dark Side of Military Web Use 142
Hacking Without a Computer 144
CHAPTER 8: The Cyberwarriors 144
Technical Terms You Might Not Recognize in This Chapter 144
Will Cyberwar Work? 146
Information War Then and Now 147
The Gulf War, the First Information War 151
Peacetime Information War 152
The United States Cyberwar Command 153
Cyberwarfare Units Around the World 156
Mysterious China Catches Up with Its Past 161
The FBI and the National Infrastructure Protection Center (NIPC) 163
The Missing Cyberwarriors 166
Web Risk Assessment Team 167
The Cybermilitia 168
What Cyberwar Will Look Like 170
CHAPTER 9: The Cyberwarrior’s Weapon and Tools 175
Technical Terms You Might Not Recognize in This Chapter 175
The Cyberwarrior’s Toolbox 176
Tools and Techniques of SPAA (Scan, Probe, Analyze, Attack) 179
SIPRNET and the Threat 182
Data Mining, OLAP, and Brushing 185
Wiretaps and Information Warfare 188
The Faster Cyberwarrior Wins 192
The Battlefield Internet 193
Full Color and Guided by Satellite 199
AirNet and Information from Above 202
Military Chat 203
Missile Masters on the Battlefield Internet 204
CHAPTER 10: The Enemy: Black Hats, Script Kiddies, and Crackers 207
Technical Terms You Might Not Recognize in This Chapter 207
Black-Hat Hackers 208
Patterns of Attack 212
Black Hats and Honey Pots 213
Cybercrimes and Cyberterrorism 215
Cybercriminals 219
Common Internet Fraud Schemes 221
The Year of the DDOS Zombie 224
The Feds Get on the Case 228
Rampaging Vulnerabilities 234
The Dark Side’s Superhighway 239
Spare a Few Viruses? 240
Microsoft the Patriot 242
CHAPTER 11: Surviving Cyberwar 244
Malicious Microsoft 244
The Invisible Internet 248
Playing Defense 249
Sneaky Spiders 254
Adware 255
Ancient Hardware 256
New Solutions 257
Important Things to Do 258
For Cable Modem or DSL Users 262
Unix/Linux Users 263
Don’t Worry, Be Happy 264
No other version available