This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
|Author||Sean Bodmer |
|Genre||Cyber Security, Deception, Counter Deception, Threat Intelligence|
|24 July 2012|
Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook which investigates two topics; first it provides methods and criteria to rectify Advanced Persistent Threats. and secondly it covers cyber deception where in an IEEE review it was noted as a "masterful presentation of deception". It details how to identity APTs and prioritize actions by applying skilled field-tested private- and government- sector processes and methods which often involves cyber deception.
Identified by Richard Austin in an IEEE review as a "masterful presentation of deception", it is clear why this work is of interest to different governments with several currently involved in or considering future actions in weaponizing cyber capabilities. It appears on the recommended reading lists for notable U.S. military institutions including the U.S. Navy War College in the Counterintelligence: Cyber Threat section and at the Joint Special Operations University site. Other military organizations have made efforts in a similar manner. In the People's Republic of China (PRC) considered to be the most active in the APT market, a special military effort was undertaken to translate it into Simplified Chinese at the PRC National Defense University Press.
The authors introduce the first theory and model for classifying a threat on the opportunistic-APT continuum as either persistent on non-persistent. It is now widely used in the industry and is built off evaluation of these following criteria:
- Risk tolerance (by the adversary)
- Skills and methods
- Attack origination points
- Numbers involved in the attack
- Knowledge source
Some additional content includes:
- Threat Intelligence
- Analysis of cyber espionage tactics contrasted with types of permissible countermeasures
- How to use deception and disinformation campaigns
- Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
- Value Chain Management
- Counter espionage and espionage
- Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.
- Sean M. Bodmer, CISSP, CEH, is founder and chief technologist at Pragmatik IO Grouip, INC
- Dr Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler.
- DrPH (c) Gregory Carpenter, CISM, is an adjunct professor at Northern Virginia CC, on the International Board of Advisors at the Mackenzie Institute, Advisory Board at EC-Council University and on the board of directors of ATNA Systems.
- Jade Jones, Juris Doctor with experience including information operations and space law. He is a civilian with the Department of Defense and a Navy JAG Commander in the U.S. Naval Reserves.
Referenced In text
Beer, P. D., & Basie, S. V. (2013). The case for cyber counterintelligence. 2013 International Conference on Adaptive Science and Technology. doi:10.1109/icastech.2013.6707493
Carli, L. D., Sommer, R., & Jha, S. (2014). Beyond Pattern Matching. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS 14. doi:10.1145/2660267.2660361
Csanádi, G. (2015). Cyber war: Poor man's weapon of mass destruction, And a new whip in the hands of the rich. Defence Review: The Central Journal of the Hungarian Defence Forces,143, 2015th ser., 154-174. 
Chung, K., Kamhoua, C. A., Kwiat, K. A., Kalbarczyk, Z. T., & Iyer, R. K. (2016). Game Theory with Learning for Cyber Security Monitoring. 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE). doi:10.1109/hase.2016.48
Conti, G., Weigand, M., Skoudis, E., Raymond, D., Cook, T., T. A., & Ragsdale, D. (2014). Towards a cyber leader course: Not for the weak or faint hearted (3rd ed., Vol. 1337, Rep.). West Point, NY: Army Cyber Institute. Department of Electrical Engineering and Computer Science, United States Military Academy
Gardner, B. (2018). Social Engineering in Non-Linear Warfare. Journal of Applied Digital Evidence, 1(1). 
Heginbotham, E., Nixon, M., Morgan, F. E., Heim, J. L., Hagen, J., Li, S., . . . Morris, L. J. (2015). The U.S.-China military Scorecard: Forces, geography, and the evolving balance of power, 1996 - 2017. Santa Monica, CA: RAND.
Henderson, B. T. (2018). A honeypot for spies: Understanding internet-based data theft (Unpublished master's thesis). Naval Postgraduate School. 
Holguín, J. M., Moreno, M., & Merino, B. (2013). Detección de APTs (p. 9, Rep.).
Maozhi, Y., & Ziwei, L. (2015). Mission and scale of the Chinese communist party strategic support force - 中共戰略支援部隊的任務與規模 (Y. Lin, Trans.). 
Pavlíková, M. (2016). Cyber operations between Russia and Ukraine during Ukrainian conflict. Obrana a Strategie (Defence and Strategy),16(1), 77-94. doi:10.3849/1802-7199.16.2016.1.077-094
Sowa, A. (2019). IT-Revision bei Betrugsaufdeckung, Investigation und Prüfung doloser Handlungen. IT-Revision, IT-Audit Und IT-Compliance,95-121. doi:10.1007/978-3-658-23765-3_4
- Advanced Persistent Threat
- Byzantine Foothold
- Moonlight Maze
- Titan Rain
- Solar Sunrise
- Operation Aurora
- Moonlight Maze
- Computer Network Defense
- Information Warfare
- Computer network operations
- Asymmetric Dominance
- Sun Tzu 孫子
- The Art of War
- Carl von Clausewitz
- On War
- "Reverse Deception Organized Cyber Threat Counter-Exploitation teaches you to debunk, pursue, and charge cyber attackers". Barnesandnoble.com. Retrieved 31 October 2016.
- "Identify, analyze, and block APTs". Barnesandnoble.com. Retrieved 31 October 2016.
- "The intricate guide of detecting malicious code and decode the types of enemies they originate from". helpnetsecurity.com. 12 July 2012. Retrieved 31 October 2016.
- "IEEE Book Reviews". Retrieved 6 May 2019.
- "Joint Special Operations University Cybersecurity Reading List". Retrieved 8 May 2019.
- "Ben Rothke Slashdot". Retrieved 8 May 2019.
- "PRC National Defense University Press". Retrieved 7 May 2019.
- "Matthijs R. Koot". Retrieved 5 May 2019.
- "Reverse Deception".