Cybercrime and Espionage

1st Edition

An Analysis of Subversive Multi-Vector Threats

Print ISBN: 9781597496131
eBook ISBN: 9781597496148
Imprint: Syngress
Published Date: 24th January 2011
Page Count: 272
45.95 + applicable tax
36.99 + applicable tax
59.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats” or ‘SMT’s. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.

Key Features

    • Includes detailed analysis and examples of the threats in addition to related anecdotal information
    • Authors’ combined backgrounds of security, military, and intelligence, give you distinct and timely insights
    • Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them


    Information and Physical Security Professionals, Intelligence Community, Federal and Municipal Law Enforcement, Auditors, Forensic Analysts, CIO/CSO/CISO

    Table of Contents




    About the Authors

    1. Cybercrime and Espionage and the New Security 101

    Information in this chapter


    He Who Does Not Prevent a Crime When He Can, Encourages It

    What’s Old Is New Again

    A Changing World

    Cybercriminal Statistics: U.S. and Abroad

    The Statistics of Cybercrime

    Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals

    Trends in 2011

    Myopic to the Catastrophic: Advanced Persistent Threats

    Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and Espionage

    Agendas in Next Generation Cybercriminal Activity

    The Coming Decade


    2. Evolution Revolution

    Information in this chapter



    Criminal Activity


    3. The Silent Killer: How Regulatory Compliance has Worsened the State of Information Security

    Information in this chapter


    Regulatory Compliance Telemetry

    Transborder Data Flow Restrictions

    ISO Security Standards

    Health Insurance Portability and Accountability Act (HIPAA)

    Family Education Rights and Privacy Act (FERPA)

    Payment Card Industry Data Security Standard (PCI DSS)

    North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP)



    4. Mediating the Great Divorce: The Convergence of Physical and Logical Security

    Information in this chapter


    The CISSP Physical Security Domains

    Environmental Security

    The Silos of Security

    Two-Factor Authentication

    Converging the Great Physical Divide

    Physical Device Security (Cryptography)

    Proximity-Based Access Control





    No. of pages:
    © Syngress 2011
    eBook ISBN:
    Paperback ISBN:


    "Risks have evolved. We haven’t. While we stabilize toward checkbox compliance, adversaries and IT accelerate onward. Adversaries know you’re compliant – and do not care – they’re counting on it. Let’s replace faith-based dogma with intellectual honesty. As fellow Cassandras, Will and John confront you with modern threat models and challenge you to adapt".--Joshua Corman, Research Director for Enterprise Security, The 451 Group

    "During 2010 three specific names signaled a fundamental shift in the risks that come from dealing in an interconnected world: Project Aurora, Stuxnet, and Wikileaks. This book provides the insights of an intelligence analyst on what got us to this point, and forecasts what information security professionals will be dealing with in the near future".--James Turner, Advisor, IBRS

    "Cybercrime and Espionage was probably the most comprehensive and relevant book on the cyber security landscape written to date. The authors captured the true essence of the methods and cyber trade craft backed with use case after use case. I find this book a must have for any security professional or executive that has the responsibility for ensuring the protection of their corporate infrastructure."--Alan Kessler VP & GM HP Networking Security Products Group/TippingPoint

    "John and Will have done a great job in framing the threat landscape and pointing out just how far we have to go in order to truly understand the cyber threats confronting us, to better secure our networks, and to mitigate risk within our respective organizations. Cybercrime and Espionage is a great read and should provide a call to action for any executive management team. Well done."--Nick Lantuh, President of Netwitness Corporation

    "Overall, this was a really interesting reading material. The authors managed to provide a fresh perspect