Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
High-Tech Crimes Revealed: Cyberwar Stories From The Digital FrontAugust 2004
Publisher:
  • Addison-Wesley Professional
ISBN:978-0-321-21873-5
Published:01 August 2004
Skip Bibliometrics Section
Reflects downloads up to 26 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes.High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run.Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice.Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigationsThis easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself."Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well."-Mike Tarrani, Independent Consultant"Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security."-Michael Nickle, Lead Consultant, VeriSign"Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy."-David Kensiski, Director of Operations, InfiniRoute Networks"The modern high-tech industry brought new things to our lives. Buying a book, selling a car, or robbing a bank has never been so easy. Why is that? You've got to read this book to find out!"-Denis Scherbakov, Systems Administrator, MCSA: Security, MCSA, MCP, Security+Atlant Telecom, ISP"Steven Branigan has been deeply involved with many real incidents of high-tech crimes-some of them I know of are too sensitive to disclose by name. Yet, High-Tech Crimes Revealed gives outsiders an opportunity to find out what actually takes place in this often-misunderstood field. By combining his powerful knowledge of computers and technology with the legal and behavioral considerations that are overlooked by those less experienced, Branigan demonstrates just how much private industry and government need to cooperate in order to find the facts and identify criminals. While his topic is deadly-serious, he conveys his riveting stories with humor and distills observations into clearly understood rules that we all should know as we go about our lives."-Ed Stroz, Former Supervisory Special Agent of the Federal Bureau of Investigation's Computer Crime Squad in New York and President of Stroz Friedberg LLC"Steven brings us behind the scenes of some very exciting hacker investigations and interviews, and tells the stories like few others. This book is an exciting read because he describes the people and their actions, showing us how these new-age crimes can affect all of us."-Steve Jurvetson, Managing Director of Draper Fisher Jurvetson"Finally, real-life credible stories that deliver first-hand accounts of tactical and strategic high-tech operations. This book is a rare look into what goes on behind the scenes. Take a front row seat with the author as he brings you into a world few have seen."-Bob Weaver, Retired Deputy Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service, Washington, D.C."Steve's intellect and real-world experience in criminal investigations, forensic analysis, and security principles is evident on every page. Sprinkle in some sound advice and a bit of humor and you have a book that is interesting, informative, and most of all, useful. I highly recommend it."-Fred Staples, Retired Director of Computer and Network Security Consulting for Telcordia Technologies"This book details story after story of computer crimes and identity theft. The best way to prevent yourself from being a victim is to take these narratives to heart."-Ben Rothke, Senior Security Consultant, ThruPoint Inc.© Copyright Pearson Education. All rights reserved.

Contributors

Reviews

Juan M Estevez-Tapiador

It should be clear that every textbook must be educational, though not all educational material comes to us in the form of a textbook. On the contrary, many of the readings we find thought provoking are not even technical by nature. The sequential exposition of techniques and topics has been, for centuries, a well-established method for transmitting knowledge. Sometimes, however, authors prefer a mere exposition of their own experiences, a summary of a few remarkable events they have been involved with during their careers. History, when appropriately distilled, is a wonderful teacher. This is definitely one of those books. Branigan has managed to gather a collection of stories in which real-world computer crimes are excellently entwined with episodes of intrigue and autobiographical elements. The result is a book that reads, in part, like a detective novel (except the crimes are real), and, in part, like a collection of reflections and useful advice. As our society becomes more reliant on computers, the potential damage caused by what the author calls high-tech crimes does not cease to grow. Branigan recognizes that it is difficult to establish to what extent we need to worry about hackers attacking our home computers, or the safety of our online bank accounts. Again, education is fundamental in helping us take the appropriate precautions, and avoid dangerous practices. In this sense, the author's words state his intentions clearly: "The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes." "This book is a report from the front lines of Internet security. In fact, this is a report from behind the enemy lines," writes William Cheswick in the foreword. The reader who approaches this book probably has heard dozens of stories about hackers penetrating government computers, credit card frauds, and so on. Surely, the feature that makes this text unique is the years the author has devoted to computer crime investigation. Readers highly familiarized with hacking stories might not find anything technically new in this book, but they learn how a high-tech crime is solved, how the culprits are traced, and all the legal complexities involved in a mean case. This is not a forensics manual, however. Do not expect to find the technical secrets behind actual crimes. Usually, the author prefers a different focus: what drives hackers to commit high-tech crimes__?__ Understanding their motivations gives us valuable knowledge about their intentions, their goals, and perhaps their behavior. As you can suppose, no technical background is required to follow the narrative, though it is recommended. I would like to emphasize two of the many conclusions Branigan discusses throughout the book: first, no crime is too small. The most insignificant event can eventually become the first step into a complex and sophisticated crime scene. Second, as you will understand after reading the book, technology itself is not the solution to high-tech crime, but only part of a complex formula, which also involves human and legal components. For anyone involved with IT security, I recommend this book as interesting bedtime reading, full of real-world anecdotes and some doses of humor. Online Computing Reviews Service

Andre C. M. Marien

There are many books on hacking. This book, however, is about crimes that use, and criminals who use, high-tech tools. What are some of the crimes__?__ How were they committed__?__ How are they detected__?__ How do police, the Federal Bureau of Investigation (FBI), and corporate security teams work and cooperate to catch the criminal__?__ What happens next__?__ The first three chapters discuss an attack on the telephone network and on an Internet service provider (ISP), and an unexpected finding. Branigan shows how the crime was detected, and how the investigators struggled with choices like calling law enforcement or waiting to do so, who to brief, and what to tell. The book contains as many legal and psychological elements as questions requiring deep technological knowledge, which you do not need to have to read the book. I read this part in one go, because the content is interesting and educational (read and learn the rules because one day you will be glad you did), and the presentation is excellent. The fourth chapter is about a sting operation, which is not something you hear about much outside movies, and clearly not for the faint of heart. The next chapters-"Identity Theft," "Let's Ask the Hackers," "Why Do Hackers Hack__?__" and "Setting the Stage"-are not as thrilling. Identity theft is a nasty problem to deal with, and it is on the rise. This chapter contains many statistics, but misses the case study approach that works so well in the previous chapters. The chapters on asking the hackers, and why hackers hack, do not present new insights. However, if you still believe in the stereotypical hacker from Hollywood, or do not consider insider threats significant, do read them. The chapter on setting the stage could have been reduced to closing thoughts, with three laws of security. Security people have a peculiar view of society, as witnessed by the first law: "In nearly any group of people, there is at least one person who is likely to commit a crime." Remember this during your next family reunion. The technological digression in this chapter seems to be out of place in this book. A chapter on high-tech crime describes various common types, what is specific to these crimes, and the response of society to this type of crime via, for instance, legal frameworks and the Digital Millennium Copyright Act (DMCA). If you are confronted with a high-tech crime, there are things not to do. This type of information is very valuable. Of course, you also need to know what to do, which is the next chapter: "How to Run a High-tech Case." If there's a chance you will end up as the one who has to deal with a possible high-tech crime, I suggest you read this book. It will not make you a forensic investigator, but you might be much more at ease when they come along to talk with you. The case studies alone are pleasant to read and informative, which is sufficient motivation to buy the book. It can be expected that the next edition will have many more stories to select from. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations