You are previewing Blackhatonomics.
O'Reilly logo

Book Description

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

      • Historical perspectives of the development of malware as it evolved into a viable economic endeavour

          • Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime.

              • Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy.

                  • Provides unique insights, analysis, and useful tools for justifying corporate information security budgets.

                      • Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement.

                          • Includes real world cybercrime case studies and profiles of high-profile cybercriminals.

                Table of Contents

                1. Cover image
                2. Title page
                3. Table of Contents
                4. Copyright
                5. Acknowledgements
                6. Dedication
                7. About the Authors
                8. About the Technical Editor
                9. Foreword
                10. Preface
                  1. How This Book is Organized
                11. Introduction. Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
                  1. Introduction
                  2. Classifying the Cyber Actor
                  3. Criminal and Organized Syndicates
                  4. Nation States
                  5. Summary
                  6. References
                12. Chapter 1. Psychological and Cultural Trends
                  1. Introduction
                  2. Psychology of Attackers
                  3. Psychology of Victims
                  4. Attackers’ Familiarity with Human Psychology
                  5. Motivations and Event-Driven Trends
                  6. Summary
                  7. References
                13. Chapter 2. Seasons of Change
                  1. Introduction
                  2. From Experiment to Exposé to Exploit
                  3. Timeline: Innovations, Intrigue, and Intrusions
                  4. Propaganda and Lulz
                  5. Summary
                  6. References
                14. Chapter 3. Drivers and Motives
                  1. Introduction
                  2. Technology Advancements and Their Effect on Crime
                  3. Motives for Committing Cybercrime
                  4. Opportunistic Cybercrime Cost Model
                  5. Summary
                  6. References
                15. Chapter 4. Signal-to-Noise Ratio
                  1. Introduction
                  2. Cyber Attacks: The Early Years
                  3. The Pendulum Swings Back: Hacktivism and DDoS
                  4. Summary
                  5. References
                16. Chapter 5. Execution
                  1. Introduction
                  2. How Cybercriminals Execute Their Schemes Using Malicious Code and Content for Profit
                  3. Identifying the Market
                  4. Identifying the Target Audience
                  5. Summary
                  6. References
                17. Chapter 6. From Russia with Love
                  1. Introduction
                  2. A Bit of History
                  3. The Cold War and Its Significance to Cybercrime
                  4. Why the Russians Understand Economics Better Than You Do
                  5. Cyber Thieves
                  6. Cyber Rackets: Botnets, Malware, Phishing, and the Rise of the Russian Cybercriminal Underground
                  7. Summary
                  8. References
                18. Chapter 7. The China Factor
                  1. Introduction
                  2. Economic Growth
                  3. Industrial Espionage
                  4. Reducing the Risk of Industrial Espionage
                  5. Security Spend Model
                  6. Summary
                  7. References
                19. Chapter 8. Pawns and Mules
                  1. Introduction
                  2. Pawns in the Game
                  3. The Heartland Breach
                  4. Acquiring and Transporting Stolen Assets without Being Detected
                  5. From Money Mules to Money Laundering
                  6. Summary
                  7. References
                20. Chapter 9. Globalization: Emerging Markets Aren’t Just for Traditional Investors Anymore
                  1. Introduction
                  2. References
                21. Chapter 10. America, Land of Opportunity
                  1. Introduction
                  2. The Birth of the Modern Internet
                  3. When Purpose Is Corrupted by Conflicting Intent
                  4. Defining the Norm: The Era of the Cybercriminal on America’s Internet
                  5. Locking the Doors while Opening the Windows: Inviting the Cybercriminal into Our World and Our Lives
                  6. Does Education Decrease Cybercrime in the United States?
                  7. Industrial Espionage and the American Experience
                  8. When the Crime Is Not Motivated by Economics
                  9. Summary
                  10. References
                22. Chapter 11. Global Law Enforcement
                  1. Introduction
                  2. Cybercrime Today
                  3. U.S. Federal Law Enforcement
                  4. Nonfederal Law Enforcement
                  5. Summary
                  6. References
                23. Chapter 12. The Road Ahead
                  1. Introduction
                  2. John Pirc: “Keeping Security Real”
                  3. Will Gragido
                  4. Nick Selby
                  5. Daniel Molina
                  6. Summary
                  7. References
                24. Index