My Account Log in

1 option

Secrets of computer espionage : tactics and countermeasures / Joel McNamara.

LIBRA TK5105.59 .M353 2003
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Author/Creator:
McNamara, Joel.
Language:
English
Subjects (All):
Electronic surveillance.
Computer security.
Physical Description:
xxi, 362 pages : illustrations ; 24 cm
Place of Publication:
Indianapolis, IN : Wiley, [2003]
Summary:
It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent -- or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure. Joel McNamara takes you inside the mind of the computer espionage artist -- amateur or professional -- and shows you appropriate defenses for a wide array of potential vulnerabilities. This is not just another book on network security. This is the book that teaches you to think like a spy, because that's the only way to outwit one.
Contents:
Chapter 1 Spies 1
Getting to Know Spies 1
What Spies Are After and Who They Are 2
Business Spies
Economic Espionage 4
Bosses
Employee Monitoring 6
Cops
Law Enforcement Investigations 7
Private Eyes and Consultants
Private Investigations 9
Spooks
Government-Sponsored Intelligence Gathering 11
Criminals
Ill-Gotten Gains 14
Whistleblowers
For the Public Good 15
Friends and Family
with Friends like These 16
Determining Your Level of Paranoia 18
Risk Analysis 101 20
Five-Step Risk Analysis 21
Chapter 2 Spying and the Law 25
Laws that Relate to Spying 25
Omnibus Crime Control and Safe Streets Act of 1968 (Title III
Wiretap Act) 26
Foreign Intelligence Surveillance Act of 1978 27
Electronic Communications Privacy Act of 1986 29
Computer Fraud and Abuse Act of 1986 32
Economic Espionage Act of 1996 34
State Laws 34
Implications of the USA Patriot Act of 2001 35
Wiretap and Stored Communications Access Acts 36
Foreign Intelligence Surveillance Act 36
Computer Fraud and Abuse Act 37
Other Provisions 39
State Laws 39
The Realities of Enforcement 39
Civil versus Criminal Court 41
Bosses and Employees
Legal Spying 42
Legal Issues with Family Members 43
Chapter 3 Black Bag Jobs 47
A Look Inside the Black Bag 47
Physical and Network Black Bag Jobs 48
Planned and Opportunistic Black Bag Jobs 49
Spy Tactics 50
Spy Games 50
Inside a Government Black Bag Job 51
Exploiting the Vulnerabilities 55
Researching and Planning the Operation 55
Gaining Entry 57
Documenting the Scene 60
Countermeasures 62
Physical Security 63
Security Policies 64
Chapter 4 Breaching the System 67
Spy Tactics 67
Exploiting the Vulnerabilities 68
System-Breaching Tools 83
Countermeasures 89
Security Settings 89
Effective Passwords 93
Encryption 93
Chapter 5 Searching for Evidence 95
Legal Spying 95
How Computer Cops Work 95
Seizure 98
Forensic Duplication 100
Examination 101
Spy Tactics 102
Exploiting the Vulnerabilities 102
Evidence-Gathering Tools 117
Countermeasures 122
Encryption 122
Steganography 127
File Wipers 130
Evidence-Eliminating Software 133
Chapter 6 Unprotecting Data 135
Spy Tactics 135
Exploiting Vulnerabilities 136
Cracking Tools 146
Countermeasures 153
Strong Encryption 153
Password Policies 154
Password Lists 156
Password Alternatives 157
Chapter 7 Copying Data 163
Spy Tactics 163
Use Available Resources 164
Use Compression Tools 164
Consider Other Data 164
Understand What's Involved in Copying Data 164
Storage Media to Target 165
Floppy Disks 166
CD-R/CD-RWs 166
DVDs 168
ZIP Disks 169
Memory Storage Devices 169
Hard Drives 171
Tape Backup Systems 174
Alternate Methods of Copying Data 174
Transferring Data Over a Network 174
Digital Cameras 175
Chapter 8 Snooping with Keyloggers 177
An Introduction to Keyloggers 177
Spy Tactics 178
Exploiting the Vulnerabilities 179
Keylogger Tools 186
Countermeasures 191
Viewing Installed Programs 191
Examining Startup Programs 191
Examining Running Processes 193
Monitoring File Writes 195
Removing Visual Basic Runtimes 196
Searching for Strings 196
Using Personal Firewalls 196
Using File Integrity and Registry Checkers 196
Using Keylogger-Detection Software 197
Using Sniffers 198
Detecting Hardware Keyloggers 199
Exploiting Keylogger Passwords 200
Using Linux 200
Watching for Unusual Crashes 201
Removing Keyloggers 202
Chapter 9 Spying with Trojan Horses 205
Spy Tactics 205
Exploiting the Vulnerabilities 206
Trojan Horse Tools 216
Countermeasures 221
Network Defenses 221
Using Registry Monitors and File-Integrity Checkers 222
Using Antivirus Software 223
Using Trojan Detection Software 223
Removing Trojan Horses 224
Using Non-Microsoft Software 224
Chapter 10 Network Eavesdropping 227
Introduction to Network Spying 227
Types of Network Attacks 227
Network Attack Origin Points 228
Information Compromised During Network Attacks 229
Broadband Risks 230
Spy Tactics 232
Exploiting the Vulnerabilities 232
Network-Information and -Eavesdropping Tools 242
Countermeasures 246
Applying Operating System and Application Updates 246
Using Intrusion Detection Systems 246
Using Firewalls 247
Running a Virtual Private Network 250
Monitoring Network Connections 251
Using Sniffers 251
Using Port and Vulnerability Scanners 252
Encrypting Your E-Mail 253
Encrypting Your Instant Messages 253
Using Secure Protocols 254
Don't Trust "Strange" Computers and Networks 254
Hardening Windows File Sharing 254
Using Secure Web E-Mail 255
Using Anonymous Remailers 255
Using Web Proxies 256
Chapter 11 802.11b Wireless Network Eavesdropping 259
An Introduction to Wireless Networks 259
History of the Wireless Network 259
Spy Tactics 260
Exploiting the Vulnerabilities 261
Wireless-Network-Eavesdropping Tools 266
Countermeasures 284
Audit Your Own Network 284
Position Antennas Correctly 284
Detect Wireless Discovery Tools 285
Fool Discovery Tools 285
Enable WEP 286
Change WEP Keys Regularly 286
Authenticate MAC Addresses 286
Rename the SSID 286
Disable Broadcast SSID 287
Change the Default AP Password 287
Use Static IP Addresses versus DHCP 287
Locate APs Outside Firewalls 287
Use VPNs 287
Don't Rely on Distance as Security 288
Turn Off the AP 288
Chapter 12 Spying on Electronic Devices 289
Office Devices 289
Fax Machines 289
Shredders 292
Communication Devices 294
Telephones 294
Cellular Phones 299
Answering Machines and Voice-Mail 303
Pagers 305
Consumer Electronics 307
PDAs 307
Digital Cameras 309
GPS Units 309
Video Game Consoles 310
MP3 Players 311
Television Digital Recorders 311
Chapter 13 Advanced Computer Espionage 313
TEMPEST
Electromagnetic Eavesdropping 313
Emanation Monitoring: Fact or Fiction? 314
EMSEC Countermeasures 318
Optical TEMPEST
LEDs and Reflected Light 319
HIJACK and NONSTOP 319
ECHELON
Global Surveillance 320
How ECHELON Works 321
ECHELON Controversy and Countermeasures 322
Carnivore/DCS-1000 325
An Overview of Carnivore 325
Carnivore Controversy and Countermeasures 326
Magic Lantern 327
Modified Applications and Operating System Components 329
Intelligence-Gathering Viruses and Worms 332
Viruses and Worms 333
Countermeasures 336
Surveillance Cameras 336
Webcams 337
Commercial Surveillance Cameras 339.
Notes:
Includes index.
ISBN:
0764537105
OCLC:
52491336

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account