Jump to content

Reverse Deception

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 38.127.201.3 (talk) at 17:43, 29 November 2016. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Reverse Deception: Organized Cyber Threat Counter-Exploitation
AuthorSean Bodmer, Dr Max Kilger, Dr PH(c) Gregory Carpenter, and Jade Jones, JD[1]
LanguageEnglish
SeriesJack Reacher
GenreCyber Security
PublisherMcGraw-Hill Publishers
Publication date
24 July 2012[1]
Publication placeUnited States
Media typePaperback[2]
Pages464 pp[1]
ISBN978-0071772495

Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook by Sean Bodmer, Dr. Max Kilger, Dr. PH(c) Gregory Carpenter, and Jade Jones, JD about providing methods to rectify Advanced Persistent Threats.[3] It details how to identity APTs and prioritize actions through applying skilled field-tested private- and government-sector methods.[3] It also trains one to expose, pursue, and charge the creators of Advanced Persistent Threats.[3] Additionally, the authors explain and demonstrate how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The authors provide full coverage of legal and ethical issues; specifically, how an IT professional can approach a corporate lawyer and explain what they would like to do with implementing deceptive network options in a language the legal council will understand. Computer adversary profiling and counterintelligence techniques assist professionals and the book adds another dimension by rounding out with operational vetting, and security team management.

The book also covers a "theoretical" hack of the virtual currency, Bitcoin. The following year, Bitcoin was attacked and millions were stolen. [4]

Features inside book

Some of the features of the book are.[3]

  • Figuring out the types of enemies threats derive from.
  • Analysis of cyber espionage tactics seen in the United States and globally, with comparisons of type of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa.
  • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
  • Cat-and-mouse approaches which explain how to use duplicity and disinformation techniques against incoming threats.
  • Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
  • How to distinguish the appearance of malicious code
  • Identify, analyze, and block APTs
  • Value Chain Management
  • Counter espionage and espionage
  • Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.

Authors

  • Sean M. Bodmer, CISSP, CEH, is Chief Researcher of Counter-Exploitation Intelligence at CounterTack, Inc. a next generation endpoint security firm. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits.
  • Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intelligence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanford University in Social Psychology in 1993.
  • Dr PH (c) Gregory Carpenter, CISM, is an Adjunct Professor at Northern Virginia CC & on the Board of Directors of ATNA Systems. He served at the Army Cyber Command, National Security Agency / Central Security Service, Joint Task Force for Global Network Operations and the Army Material Command. In his over 30 year military and civilian career with the Federal Government, he served in the Infantry, Logistics, Information Operations, Counterintelligence, Medical Service, Electronic Warfare and Military Intelligence branches. In 2007 he received the NSA Military Performer of the Year Award and is working the dissertation in his Dr of Public Health.
  • Jade Jones, JD, has 15 years practice experience. Areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.

Referenced In Text

Heginbotham, E. (2015). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017. Santa Monica, CA: RAND.

See also

References