Part II Cyber Espionage and Exploitation

In this part, we discuss cyber espionage and exploitation, which deals with the theft of information through and from computer systems. Throughout the last decade, there have been many such incidents which are believed to be politically motivated. In most of these cases, the data are stolen as part of intelligence collection, theft of intellectual property and/or to gain a technological knowledge of an adversary’s weapons systems. Many such events were attributed to hackers from China. Hence, all of Chapter 7 is dedicated to cyber espionage attributed to China. This if followed by a discussion of the more recently discovered cyber-based intelligence gathering platforms such as Duqu, Flame, and Gauss in ...

Get Introduction to Cyber-Warfare now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.