--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments
"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."
--Jim Stogdill, CTO, Mission Services Accenture
You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.
Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.
Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
Chapter 1 Assessing the Problem
The Complex Domain of Cyberspace
The Conficker Worm: The Cyber Equivalent of an Extinction Event?
Africa: The Future Home of the World’s Largest Botnet?
The Way Forward
Chapter 2 The Rise of the Non-State Hacker
The StopGeorgia.ru Project Forum
The Russian Information War
The Gaza Cyber War Between Israeli and Arabic Hackers During Operation Cast Lead
Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria
Are Non-State Hackers a Protected Asset?
Chapter 3 The Legal Status of Cyber Warfare
Nuclear Nonproliferation Treaties
The Antarctic Treaty System and Space Law
The Law of Armed Conflict
Is This an Act of Cyber Warfare?
Cyber: The Chaotic Domain
Chapter 4 Responding to International Cyber Attacks As Acts of War
Introduction by Jeffrey Carr
The Legal Dilemma
The Law of War
Non-State Actors and the Law of War
Analyzing Cyber Attacks Under Jus ad Bellum
The Choice to Use Active Defenses
Chapter 5 The Intelligence Component to Cyber Warfare
The Korean DDoS Attacks (July 2009)
One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
Ingushetia Conflict, August 2009
The Predictive Role of Intelligence
Chapter 6 Non-State Hackers and the Social Web
The Middle East
Pakistani Hackers and Facebook
The Dark Side of Social Networks
TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
Automating the Process
Chapter 7 Follow the Money
Components of a Bulletproof Network
The Bulletproof Network of StopGeorgia.ru
The Kremlin and the Russian Internet
A Three-Tier Model of Command and Control
Chapter 8 Organized Crime in Cyberspace
A Subtle Threat
Russian Organized Crime and the Kremlin
Chapter 9 Investigating Attribution
Using Open Source Internet Data
Team Cymru and Its Darknet Report
Chapter 10 Weaponizing Malware
A New Threat Landscape
Chapter 11 The Role of Cyber in Military Doctrine
The Russian Federation
China Military Doctrine
Chapter 12 A Cyber Early Warning Model
Introduction by Jeffrey Carr
The Challenge We Face
Chapter 13 Advice for Policy Makers from the Field
When It Comes to Cyber Warfare: Shoot the Hostage
The United States Should Use Active Defenses to Defend Its Critical Information Systems
Scenarios and Options to Responding to Cyber Attacks
Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.
The image on the cover of Inside Cyber Warfare is of light cavalry, as evidenced by the lack of armor adorning the soldier and his horse. During Roman-Germanic wars, the duties of reconnaissance, screening, and raiding fell on the light cavalry, while their more heavily armored counterparts engaged in direct enemy combat. Their weapons included spears, bows, and swords.The tribes of Central Asia, including the Huns, Turks, and Mongols, often used light cavalry for similar missions.It is important to note that practices, weapons, and so on varied depending upon historical period and region.
Comments about O'Reilly Media Inside Cyber Warfare:
This book is disappointing and I do not recommend it. It seems an incomplete recollection of examples with no real insights. His approach is shallow and naive (perhaps intentionally so). Yet, it provides interesting pointers to research elsewhere. The Wikipedia entry on Cyberwarfare is far more relevant and updated.
There are many typos, the density of content is very low, and the style seems more appropriate for a blog, not an O-Reilly book. At times it resembles an speculative conspiracy plot. This book is not technical, neither I would qualify it as a good policy brief. For a good policy overview for the USA I would recommend the (free) NAS report on Deterring Cyberattacks.
Cyberwarfare moves in the forefront of technology. As technologies mainstream and reach larger audiences, the leading edge gets more and more advanced. I chose this title looking for a technical overview of the topic, some historical examples and an evaluation of where the topic is evolving into.
It does have a few interesting description of events, policy implications and issues that make very good pointers to discuss, learn or research upon (outside this book). Interestingly I would recommend this book exatly as that, a conversation starter for the Issues and facts, not for the conclusions or narrative.
Looking at the Index I hope to make the point that the book does cover appropriate topics, but it fails to provide a structure or sense of comprehension.
Bottom Line No, I would not recommend this to a friend