ebook img

Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day PDF

349 Pages·2005·3.06 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day

01_584685 ffirs.qxd 2/18/05 4:01 PM Page iii Spies Among Us HOW TO STOP THE SPIES, TERRORISTS, HACKERS, AND CRIMINALS YOU DON’T EVEN KNOW YOU ENCOUNTER EVERY DAY Ira Winkler 01_584685 ffirs.qxd 2/18/05 4:01 PM Page i Spies Among Us HOWTO STOPTHE SPIES,TERRORISTS,HACKERS, AND CRIMINALSYOU DON’T EVEN KNOW YOU ENCOUNTER EVERY DAY 01_584685 ffirs.qxd 2/18/05 4:01 PM Page ii 01_584685 ffirs.qxd 2/18/05 4:01 PM Page iii Spies Among Us HOW TO STOP THE SPIES, TERRORISTS, HACKERS, AND CRIMINALS YOU DON’T EVEN KNOW YOU ENCOUNTER EVERY DAY Ira Winkler 01_584685 ffirs.qxd 3/4/05 4:20 PM Page iv Vice President & Executive Group Publisher:Richard Swadley Vice President and Publisher:Joseph B.Wikert Executive Acquisitions Editor:Carol Long Development Editor:Kenyon Brown Editorial Manager:Kathryn Malm Bourgoine Production Editor:Angela Smith Project Coordinator:Erin Smith Copy Editor:Susan Christophersen Text Design & Composition:Wiley Composition Services Published by Wiley Publishing,Inc. 10475 Crosspoint Boulevard Indianapolis,IN 46256 www.wiley.com Copyright © 2005 by Ira Winkler Published by Wiley Publishing,Inc.,Indianapolis,Indiana Published simultaneously in Canada ISBN:0-7645-8468-5 No part of this publication may be reproduced,stored in a retrieval system or transmitted in any form or by any means,electronic,mechanical,photocopying,recording,scanning or otherwise,except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act,without either theprior written permission of the Publisher,or authorization through payment of the appropriate per-ycopy fee to the Copyright Clearance Center,222 Rosewood Drive,Danvers,MA 01923, (978)750-8400,fax (978) 646-8600.Requests to the Publisher for permission should be addressed tothe Legal Department,Wiley Publishing,Inc.,10475 Crosspoint Blvd.,Indianapolis,IN 46256, (317) 572-3447,fax (317) 572-4355,e-mail:[email protected]. Limit of Liability/Disclaimer of Warranty:The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties,including without limitation warranties of fitness for a particular purpose. Nowarranty may be created or extended by sales or promotional materials.The advice and strategies contained herein may not be suitable for every situation.This work is sold with the understanding that the publisher is not engaged in rendering legal,accounting,or other professional services.If professional assistance is required,the services of a competent professional person should be sought.Neither the publisher nor the author shall be liable for damages arising herefrom.The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make.Further,readers should be aware that Internet Websites listed in this work may have changed or disappeared between then this work was written and when it is read. For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974,outside the United States at (317) 572-3993 or fax (317) 572-4002. Trademarks:Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons,Inc.and/or its affiliates,in the United States and other countries,and may not be used without written permission. All other trademarks are the property of their respective owners.Wiley Publish- ing,Inc.,is not associated with any product or vendor mentioned in this book. Wiley also publishes its books in a variety of electronic formats.Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data: Winker,Ira. Spies among us :how to stop the spies,terrorists,hackers,and criminals you don’t even know you encounter every day/ Ira Winkler. p.cm. Includes index. ISBN 0-7645-8468-5 (cloth) 1. Espionage. 2. Business intelligence. 3. Computer crimes--Prevention. 4. Terrorism--Prevention. I. Title. UB250.W55 2005 658.4'72--dc22 2004028735 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 01_584685 ffirs.qxd 2/18/05 4:01 PM Page v To the Silent Ninja,Jazz,WWW,and the Big BadWolf,who make it difficult to want to sit down and write a book. 01_584685 ffirs.qxd 2/18/05 4:01 PM Page vi 02_584685 ftoc.qxd 2/17/05 8:35 PM Page vii Contents ACKNOWLEDGMENTS IX ABOUT THE AUTHOR X INTRODUCTION XI PART I: ESPIONAGE CONCEPTS 1 1. HOW TO BE A SPY 3 2. WHY YOU CAN NEVER BE SECURE 30 3. DEATH BY 1,000 CUTS 40 4. SPIES AND THEIR FRIENDS 52 5. HOW THE SPIES REALLY GET YOU 106 PART II: CASE STUDIES 153 6. SPY VS. SPY 155 7. NUCLEAR MELTDOWN 171 8. FILL ’ER UP! 180 9. THE ENTREPRENEUR 189 10. THE CRIMINAL FACE OF THE INTERNET AGE 200 11. CRIMES AGAINST INDIVIDUALS 214 vii 02_584685 ftoc.qxd 2/17/05 8:35 PM Page viii viii Contents PART III: STOPPING THE SPIES 229 12. TAKING CONTROL 231 13. TAKING ACTION 294 INDEX 307 03_584685 flast.qxd 2/17/05 8:35 PM Page ix Acknowledgments There are many people I should thank.Most of what is in this book is due to my combined experiences of the last 20 years.All the people I have met in those years have helped me.Ironically,some of the most useful knowledge I have gathered came from the people who are the walking horror stories.It is a lot easier to learn what not to do when it stares you in the face. The groups of people who deserve special mention (for doing things right) include,but are not limited to,the security awareness divi- sion at NSA for giving me an incredibly good base of knowledge, whether or not I wanted it;the Information Systems department at the University of Maryland,Baltimore County,especially Tony Norcio and Jack Stott,who taught me that computers are only tools that support business;and also the many security managers I have met and worked with during the last two decades.I sincerely hope this book helps them to do their jobs. I have to thank all the people who kept bothering me to write another book.I must also thank Carol Long,the acquisitions editor,for thinking more highly of the book than even myself.Kenyon Brown was also invaluable for giving me suggestions that I didn’t want to hear. I also appreciate the time the following people worked into their schedules to meet with me:General Kenneth Minihan,James Woolsey, Larry Hale,Christopher Painter,John Nolan,Colonel Stanislav Lunev, and Ron Dick.There are also many other people I should mention, but either forgot because I am rushed to get this in (it is still appreci- ated and sorry about that),or left out because they prefer not to be mentioned for a variety of reasons. Last,I’d like to especially thank the agents who didn’t want to rep- resent the book,allowing me to keep all my royalties. ix

Description:
Ira Winkler has been dubbed ''A Modern Day James Bond'' by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case stud
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.