Inside Cyber Warfare: Mapping the Cyber Underworld [NOOK Book]


When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.

This updated second edition takes a detailed look ...

See more details below
Inside Cyber Warfare: Mapping the Cyber Underworld

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$22.49 price
(Save 42%)$38.99 List Price


When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.

This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

  • Discover how Russian investment in social networks benefits the Kremlin
  • Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa
  • Explore the rise of anarchist groups such as Anonymous and LulzSec
  • Look inside cyber warfare capabilities of nations including China and Israel
  • Understand how the U.S. can legally engage in covert cyber operations
  • Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations

Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

Read More Show Less

Product Details

  • ISBN-13: 9781449325459
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 12/9/2011
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 2
  • Pages: 318
  • File size: 8 MB

Meet the Author

Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.

Read More Show Less

Table of Contents

How This Book Came to Be;
Conventions Used in This Book;
Attributions and Permissions;
How to Contact Us;
Safari® Books Online;
Chapter 1: Assessing the Problem;
1.1 The Complex Domain of Cyberspace;
1.2 Cyber Crime;
1.3 Future Threats;
1.4 The Conficker Worm: The Cyber Equivalent of an Extinction Event?;
1.5 Africa: The Future Home of the World’s Largest Botnet?;
1.6 The Way Forward;
Chapter 2: The Rise of the Nonstate Hacker;
2.1 The Project Forum;
2.2 The Russian Information War;
2.3 The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead;
2.4 Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria;
2.5 Are Nonstate Hackers a Protected Asset?;
Chapter 3: The Legal Status of Cyber Warfare;
3.1 Nuclear Nonproliferation Treaties;
3.2 The Antarctic Treaty System and Space Law;
3.4 MLAT;
3.5 The Law of Armed Conflict;
3.6 Is This an Act of Cyber Warfare?;
3.7 Cyber: The Chaotic Domain;
Chapter 4: Responding to International Cyber Attacks as Acts of War;
4.1 The Legal Dilemma;
4.2 The Law of War;
4.3 Nonstate Actors and the Law of War;
4.4 Analyzing Cyber Attacks under Jus ad Bellum;
4.5 The Choice to Use Active Defenses;
4.6 Conclusion;
Chapter 5: The Intelligence Component to Cyber Warfare;
5.1 The Korean DDoS Attacks (July 2009);
5.2 One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack;
5.3 Ingushetia Conflict, August 2009;
5.4 The Predictive Role of Intelligence;
Chapter 6: Nonstate Hackers and the Social Web;
6.1 Russia;
6.2 China;
6.3 The Middle East;
6.4 Pakistani Hackers and Facebook;
6.5 The Dark Side of Social Networks;
6.6 TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences;
6.7 Automating the Process;
Chapter 7: Follow the Money;
7.1 False Identities;
7.2 Components of a Bulletproof Network;
7.3 The Bulletproof Network of;
7.4 SORM-2;
7.5 The Kremlin and the Russian Internet;
7.6 A Three-Tier Model of Command and Control;
Chapter 8: Organized Crime in Cyberspace;
8.1 A Subtle Threat;
8.2 Russian Organized Crime and the Kremlin;
Chapter 9: Investigating Attribution;
9.1 Using Open Source Internet Data;
9.2 Team Cymru and Its Darknet Report;
9.3 Using WHOIS;
Chapter 10: Weaponizing Malware;
10.1 A New Threat Landscape;
Chapter 11: The Role of Cyber in Military Doctrine;
11.1 The Russian Federation;
11.2 China Military Doctrine;
Chapter 12: A Cyber Early Warning Model;
12.1 The Challenge We Face;
Chapter 13: Advice for Policymakers from the Field;
13.1 When It Comes to Cyber Warfare: Shoot the Hostage;
13.2 The United States Should Use Active Defenses to Defend Its Critical Information Systems;
13.3 Scenarios and Options to Responding to Cyber Attacks;
13.4 In Summary;
13.5 Whole-of-Nation Cyber Security;
Chapter 14: Conducting Operations in the Cyber-Space-Time Continuum;
14.1 Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement;
14.2 Social Networks: The Geopolitical Strategy of Russian Investment in Social Media;
14.3 Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec;
Chapter 15: The Russian Federation: Information Warfare Framework;
15.1 Russia: The Information Security State;
15.2 Russian Ministry of Defense;
15.3 Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO);
15.4 Russian Federation Ministry of Communications and Mass Communications (Minsvyaz);
15.5 Further Research Areas;
Chapter 16: Cyber Warfare Capabilities by Nation-State;
16.1 Australia;
16.2 Brazil;
16.3 Canada;
16.4 Czech Republic;
16.5 Democratic People’s Republic of Korea;
16.6 Estonia;
16.7 European Union;
16.8 France;
16.9 Germany;
16.10 India;
16.11 Iran;
16.12 Israel;
16.13 Italy;
16.14 Kenya;
16.15 Myanmar;
16.16 NATO;
16.17 Netherlands;
16.18 Nigeria;
16.19 Pakistan;
16.20 People’s Republic of China;
16.21 Poland;
16.22 Republic of Korea;
16.23 Russian Federation;
16.24 Singapore;
16.25 South Africa;
16.26 Sweden;
16.27 Taiwan (Republic of China);
16.28 Turkey;
16.29 United Kingdom;
Chapter 17: US Department of Defense Cyber Command and Organizational Structure;
17.1 Summary;
17.2 Organization;
Chapter 18: Active Defense for Cyber: A Legal Framework for Covert Countermeasures;
18.1 Covert Action;
18.2 Cyber Active Defense Under International Law;
18.3 Cyber Active Defenses as Covert Action Under International Law;
18.4 Cyber Attacks Under International Law: Nonstate Actors;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)