Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day

Overview

They truly ARE everywhere. But if you're looking for James Bond orSydney Bristow, you're going to be disappointed. The real spies areso much more effective.

They convinced your neighbor to "confirm" his PayPal accountinformation at a bogus Web site where they acquired everything theyneeded to heist his identity. They stole millions of calling cardnumbers by installing transmitters into telephones in Grand CentralStation. They've boosted plans and diagrams for top-secretequipment...

See more details below
Other sellers (Hardcover)
  • All (45) from $1.99   
  • New (12) from $4.29   
  • Used (33) from $1.99   
Sending request ...

Overview

They truly ARE everywhere. But if you're looking for James Bond orSydney Bristow, you're going to be disappointed. The real spies areso much more effective.

They convinced your neighbor to "confirm" his PayPal accountinformation at a bogus Web site where they acquired everything theyneeded to heist his identity. They stole millions of calling cardnumbers by installing transmitters into telephones in Grand CentralStation. They've boosted plans and diagrams for top-secretequipment to sell to the highest bidder. And they've chargedbillions to credit cards belonging to ordinary, decentcitizens—maybe even you.

The real spies exploit every weakness in our personal andcorporate worlds—operational, physical, technical, and human.They may be the pizza delivery guy, the new receptionist, or maybeeven one of the tech support team. But one thing issure—they're all around us.

Here's how to fight back.

Read More Show Less

Editorial Reviews

From the Publisher
Required reading by counterintelligence warrant officers intraining at the U.S. Army Intelligence Center, Spies AmongUs is a primer into the basic principles of intelligenceoperations. Indeed, Ira Winkler notes that spies, terrorists,hackers, and criminals all use the same basic techniques to collectinformation on their targets.
Mr. Winkler is a former undercover security analyst with theNational Security Agency, who now works with governments and majorcorporations to help them uncover potential security breaches. Hestates in the introduction to Spies Among Us that there seems to bea fascination with spectacular acts committed by terrorists,foreign intelligence operatives, and computer hacking geniuses.Against such threats, corporations and individuals are tempted tofeel powerless. Such acts, though potentially devastating, arequite rare and only affect relatively small numbers of people andbusinesses. Conversely, natural disasters, accidents, and criminalacts, though not as spectacular, are much more common and affectmany more people. In Spies Among Us, Mr. Winkler seeks to empowerhis readers with simple countermeasures that can mitigate thecommon threats we all face. He further adds that such prudence alsohelps protect against attacks from the terrorists, spies, andcomputer geniuses.
Spies Among Us is divided into three parts. Part I discusses thefundamental concepts of the intelligence process, espionage, andcrime. Part II explores the details of some notable penetrationtests conducted by Mr. Winkler and his colleagues as well as somereal-world cases of high- level crime and espionage. Finally, PartIII describes the simple countermeasures that can be used to reduceboth individual and corporate vulnerabilities to variousthreats.
In Part I, Mr. Winkler defines risk, threat, vulnerability,counter-measures, value, and their interrelationship. He furtherexplains how to determine the value of assets and how to evaluatevarious threats against those assets. Of particular interest toBECCA members, Mr. Winkler thoroughly describes the corporateespionage threats that U.S. corporations face. He lists the majorcountries that successfully use their state intelligence agenciesto target U.S. corporations. Among those countries are two U.S.allies identified by the CIA as conducting espionage against U.S.companies: France and Israel. Furthermore, Mr. Winkler describeshow each nation targets U.S. corporations both at home and abroad.He states that the U.S. government is quite different than that ofmost other industrialized nations in that it generally does notcollect intelligence on behalf of its corporations. Contrast thiswith the statement of Pierre Marion, the former head of the Frenchforeign intelligence agency who has stated, "There is no such thingas an economic ally." Among other countries, the U.S. government isconsidered "naïve" in its view of international corporateespionage.
In addition to foreign intelligence threats, Part II of Spies AmongUs explains how corporate information leaks can be caused orexploited by insiders (employees), petty crime, suppliers,customers, and competitors. In regards to employees, the authordraws an amazing parallel between the profile of an extremely hard-working employee and that of a spy. They both show interest in whattheir coworkers are doing, they volunteer For extra work, they worklate, and they rarely take vacations. Attackers Targetvulnerabilities of corporations and individuals. Mr. Winklerdefines Vulnerabilities in four categories: operational, physical,personnel, and technical. Under operational vulnerabilities, headdresses security awareness and makes a notable statement, that"there is no common sense without common knowledge," emphasizingthe importance of security awareness training for everyone.
In Part II, not only does the author describe various successfulattacks Against major corporations, he also describes thevulnerabilities which facilitated or allowed these attacks.
In Part III, Mr. Winkler explains simple countermeasures to addressthese vulnerabilities and similar vulnerabilities of individuals.He defines these countermeasures in the same categories that heused for vulnerabilities. However, he makes the interestingobservation that the categories do not necessarily correlate. Forinstance, he states that poor security awareness is an operationalvulnerability. However, an effective countermeasure for poorawareness is a technical countermeasure such as token-basedauthentication which thwarts social engineering attacks designed toobtain passwords from users. In the final chapter, Mr. Winklerprovides practical suggestions for implementing and testingcountermeasures and incident response procedures. He includes soundadvice on how to garner support from management and compliance fromemployees. He states that an effective security awareness programcould result in "thousands of people detecting security problems,not just the two people in a typical security department."
As a military intelligence professional, I found Spies Among Us tobe a fascinating and enlightening read. As only someone who hasgreat understanding can, Mr. Winkler greatly simplifies theintelligence process and provides interesting insights into recentevents. He also writes from the vantage point of an insider. Thesecurity countermeasures he recommends are practical and feasiblefor both organizations and individuals to implement. As someone whosees the need for professional reading but who does not normallyenjoy such activity, I found this book to be refreshingly enjoyableto read. I highly recommend Spies Among Us to anyone working in thesecurity or intelligence field. I also highly recommend it toanyone else who has ever felt vulnerable or who just wants to peerinto the hidden world of espionage and crime that is always amongus.
"Spies Among Us reads like a Robert Ludlum novel, [and] it’sriveting because it’s all true. If you’ve got a socialsecurity number, you need to read this book whether you’re aCEO or a grandmother. Winkler reveals the top threats to ourpersonal and national security, with lots of straight-forwardadvice on how to protect yourself."
–Soledad O'Brien, CNN
Read More Show Less

Product Details

  • ISBN-13: 9780764584688
  • Publisher: Wiley
  • Publication date: 4/8/2005
  • Edition number: 1
  • Pages: 346
  • Sales rank: 992,000
  • Product dimensions: 6.00 (w) x 9.00 (h) x 0.94 (d)

Meet the Author

Ira Winkler, dubbed a modern-day James Bond, began his career with the super-secret National Security Agency as an undercover security analyst. Since then he has assisted various agencies of the United States and other governments, as well as major corporations, in their battle against the technological underworld. Relentless in his dedication to sealing security breaches, he has "stolen" billions of dollars from huge corporations, lifted nuclear reactor designs in less than four hours, and hacked into multinational networks. In a single day, he siphoned off a billion dollars' worth of information from a leading corporation, exposing a potentially disastrous security gap. Along with espionage simulations and penetration testing, he also investigates cybercrime. Visit his Web site at www.irawinkler.com

Read More Show Less

Table of Contents

Acknowledgments.

About the Author.

Introduction.

PART I: ESPIONAGE CONCEPTS.

1. How to Be a Spy.

2. Why You Can Never Be Secure.

3. Death by 1,000 Cuts.

4. Spies and Their Friends.

5. How the Spies Really Get You.

PART II: CASE STUDIES.

6. Spy vs. Spy.

7. Nuclear Meltdown.

8. Fill'er Up!

9. The Entrepreneur.

10. The Criminal Face of the Internet Age.

11. Crimes Against Individuals.

PART III: STOPPING THE SPIES.

12. Taking Control.

13. Taking Action. Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)