Secrets of computer espionage: tactics and countermeasures

Front Cover
Wiley, Jun 20, 2003 - Political Science - 362 pages
4 Reviews
Is someone spying on you?

You might be surprised

It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent-or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure.

Joel McNamara takes you inside the mind of the computer espionage artist-amateur or professional-and shows you appropriate defenses for a wide array of potential vulnerabilities.

This is not just another book on network security. This is the book that teaches you to think like a spy, because that's the only way to outwit one.

  • Analyze your risk of becoming a target of espionage
  • Recognize and lock down the vulnerabilities of instant messaging, Web browsers, e-mail inboxes, and address books
  • Understand where electronic eavesdropping becomes criminal-and where it's perfectly legal
  • Discover how spies circumvent security measures and learn how to protect yourself
  • Find out how law enforcement recovers evidence from a suspect computer
  • See how a determined spy can compromise the average fax machine, paper shredder, cell phone, voice-mail, pager, PDA, and digital camera
  • Learn how the government uses computer espionage techniques to combat drug lords, organized crime, foreign terrorists, and industrial espionage
  • Explore some of the top-secret national spying projects like TEMPEST, ECHELON, Carnivore/DCS-1000, intelligence-gathering worms and viruses, and what impact they may have on you

From inside the book

What people are saying - Write a review

Review: Secrets of Computer Espionage: Tactics and Countermeasures

User Review  - Captain Jack - Goodreads

This book was amazing, but just the slightest bit obselete. It has how-to information, both attack and defense, and suggestions for buying products. The coolest section was about black bag jobs, where ... Read full review

Review: Secrets of Computer Espionage: Tactics and Countermeasures

User Review  - Louis - Goodreads

NSA am I on your "good" or "bad" list? Realistically, I am probably on their "watch" list. Read full review

Contents

Spies
1
Summary
24
Spying and the Law
25
Copyright

16 other sections not shown

Common terms and phrases

About the author (2003)

Joel McNamara is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.

Bibliographic information