Reverse Deception

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception.jpg
AuthorSean Bodmer
Max Kilger
Gregory Carpenter
Jade Jones
CountryUnited States
LanguageEnglish
GenreCyber Security, Deception, Counter Deception, Threat Intelligence
PublisherMcGraw-Hill Publishers
Publication date
24 July 2012[1]
Media typePaperback[2]
Pages464 pp[1]
ISBN978-0071772495

Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook which investigates two topics; first it provides methods and criteria to rectify Advanced Persistent Threats.[3] and secondly it covers cyber deception where in an IEEE review it was noted as a "masterful presentation of deception".[4] It details how to identity APTs and prioritize actions by applying skilled field-tested private- and government- sector processes and methods which often involves cyber deception.[3]

Content[edit]

Identified by Richard Austin in an IEEE review as a "masterful presentation of deception",[4] it is clear why this work is of interest to different governments with several currently involved in or considering future actions in weaponizing cyber capabilities. It appears on the recommended reading lists for notable U.S. military institutions including the U.S. Navy War College in the Counterintelligence: Cyber Threat section[5] and at the Joint Special Operations University[6] site. Other military organizations have made efforts in a similar manner. In the People's Republic of China (PRC) considered to be the most active in the APT market,[7] a special military effort was undertaken to translate it into Simplified Chinese at the PRC National Defense University Press.[8]

The authors introduce the first theory and model for classifying a threat on the opportunistic-APT continuum as either persistent on non-persistent. It is now widely used in the industry and is built off evaluation of these following criteria:[7][4][9]

APT CRITERIA[10]

  • Objectives
  • Timeliness
  • Resources
  • Risk tolerance (by the adversary)
  • Skills and methods
  • Actions
  • Attack origination points
  • Numbers involved in the attack
  • Knowledge source

Some additional content includes:[3]

  • Threat Intelligence
  • Analysis of cyber espionage tactics contrasted with types of permissible countermeasures
  • How to use deception and disinformation campaigns
  • Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
  • Value Chain Management
  • Counter espionage and espionage
  • Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.

Authors[edit]

  • Sean M. Bodmer, CISSP, CEH, is founder and chief technologist at Pragmatik IO Grouip, INC
  • Dr Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler.
  • DrPH (c) Gregory Carpenter, CISM, is an adjunct professor at Northern Virginia CC, on the International Board of Advisors at the Mackenzie Institute, Advisory Board at EC-Council University and on the board of directors of ATNA Systems.
  • Jade Jones, Juris Doctor with experience including information operations and space law. He is a civilian with the Department of Defense and a Navy JAG Commander in the U.S. Naval Reserves.

Referenced In text[edit]

Beer, P. D., & Basie, S. V. (2013). The case for cyber counterintelligence. 2013 International Conference on Adaptive Science and Technology. doi:10.1109/icastech.2013.6707493

Carli, L. D., Sommer, R., & Jha, S. (2014). Beyond Pattern Matching. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS 14. doi:10.1145/2660267.2660361

Csanádi, G. (2015). Cyber war: Poor man's weapon of mass destruction, And a new whip in the hands of the rich. Defence Review: The Central Journal of the Hungarian Defence Forces,143, 2015th ser., 154-174. [1]

Chung, K., Kamhoua, C. A., Kwiat, K. A., Kalbarczyk, Z. T., & Iyer, R. K. (2016). Game Theory with Learning for Cyber Security Monitoring. 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE). doi:10.1109/hase.2016.48

Conti, G., Weigand, M., Skoudis, E., Raymond, D., Cook, T., T. A., & Ragsdale, D. (2014). Towards a cyber leader course: Not for the weak or faint hearted (3rd ed., Vol. 1337, Rep.). West Point, NY: Army Cyber Institute. Department of Electrical Engineering and Computer Science, United States Military Academy

Gardner, B. (2018). Social Engineering in Non-Linear Warfare. Journal of Applied Digital Evidence, 1(1). [2]

Heckman, K. E., Stech, F. J., Thomas, R. K., Schmoker, B., & Tsow, A. W. (2015). Cyber denial, deception and counter deception: A framework for supporting active cyber defense. ISBN 3319251317

Heginbotham, E., Nixon, M., Morgan, F. E., Heim, J. L., Hagen, J., Li, S., . . . Morris, L. J. (2015). The U.S.-China military Scorecard: Forces, geography, and the evolving balance of power, 1996 - 2017. Santa Monica, CA: RAND.

Henderson, B. T. (2018). A honeypot for spies: Understanding internet-based data theft (Unpublished master's thesis). Naval Postgraduate School. [3]

Holguín, J. M., Moreno, M., & Merino, B. (2013). Detección de APTs (p. 9, Rep.).

Jajodia, S., Subrahmanian, V. S., Swarup, V., & Wang, C. (2016). Cyber deception: Building the scientific foundation. ISBN 331932697X

Lucas, E. (2017). Cyberphobia: Identity, trust, security and the internet. Bloomsbury. ISBN 9781632862266

Maozhi, Y., & Ziwei, L. (2015). Mission and scale of the Chinese communist party strategic support force - 中共戰略支援部隊的任務與規模 (Y. Lin, Trans.). [4]

Pavlíková, M. (2016). Cyber operations between Russia and Ukraine during Ukrainian conflict. Obrana a Strategie (Defence and Strategy),16(1), 77-94. doi:10.3849/1802-7199.16.2016.1.077-094

Rowe, N. C., & Rrushi, J. (2018). Introduction to cyberdeception. Springer. ISBN 3319822888

Saadawi, T. N., Jordan, L., Boudreau, V., & Colwell, J. (2011). Cyber infrastructure protection. Carlisle, PA: Strategic Studies Institute, U.S. Army War College. ISBN 1-58487-753-7

Sowa, A. (2019). IT-Revision bei Betrugsaufdeckung, Investigation und Prüfung doloser Handlungen. IT-Revision, IT-Audit Und IT-Compliance,95-121. doi:10.1007/978-3-658-23765-3_4

Wrightson, T. (2015). Advanced persistent threat hacking: The art and science of hacking any organization. NY, NY: McGraw-Hill Education. ISBN 0071828362

See also[edit]

References[edit]

External links[edit]