Hacking a Terror Network: The Silent Threat of Covert Channels
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Taking Back Control
Vengeance for Deceit
Eliminating False Positives
Gaining a Finger Hold
Over the Edge
Facing the Truth
Racing the Clock
A Plan Comes Together
Turning Fiction into Reality
Other books from Russ Rogers and Security Horizon Inc
actually Al Qaeda algorithms Allah already American analysts applications asked attack browser button carrier file chair clicked colors communication covert channels created crew cruise lines cruise ships datasets desk desktop detection didn’t digital image door e-mail eyes father front Gargoyle going hard drive header hidden hide information hostmask inside Internet IPv4 IPv6 Jeremy Jeremy’s Jimmy Jimmy’s JPEG knew Kyle laptop laughed Layla License Linux look mind Neil Neil’s never newsgroups normal null ciphers Okay operating system option password payload pixel pulled Qaeda replied resource fork Salah scan screen server smiled someone spam spam e-mail started steganography Stego sure Syngress team members tell terrorist things thought tion took trying Tyler walked WarDriving wasn’t watched we’re what’s window woman young